Modern Software Factory for Mainframe
The Trick to Passing
Your Next Compliance
Audit
What will you say when an auditor comes
knocking on your door?
© 2018 CA All rights reserved.
Stuart McIrvine
VP of Product Management
CA Technologies
Today’s Speakers
Mike Vizard
IT Editor
SecurityBoulevard.com
2
© 2018 CA All rights reserved.
Your Mainframe is at Risk
3
“Big iron is still very secure…unfortunately we have this thing called people that
surround the mainframe.” – Patrick Gray, Ex FBI Security Agent
People
Insider threats range from malicious users to
well-intentioned employees making a
mistake.
Data
70% of today’s corporate data – including
sensitive and regulated data like PII – reside
on the mainframe.
Systems
The mainframe is increasingly connected
into the digital economy – applications,
mobile devices, Big Data.
SecuretheMainframe
© 2018 CA All rights reserved.
Question 1
4
Does your organization have formal processes in place to secure
mainframe data from internal threats?
A. Yes
B. No
C. It’s a work in progress
D. I don’t know
© 2018 CA All rights reserved.
Who are the involved parties?
GDPR UK Data Protection
Act 1998
PCI DSS EU-U.S. Privacy
Shield
• Prove that data is being
protected
• Appoint a Data
Protection Officer
• Fines of 4% of annual
turnover
• Information
Commissioners Office
• Wide scope
• Consent
• Cross-industry
• Protect stored cardholder
data
• Encrypt transmissions
• Maintain InfoSec policy
• U.S. Department of
Commerce and
European Commission
• Individual choice &
control
• Security
The Regulatory Ecosystem
5
Know which regulations
apply to your business.
© 2018 CA All rights reserved.
Question 2
6
Which of the following mandates apply to your organization? (Check
all that apply)
 GDPR
 HIPAA
 PCI DSS
 SOX
 FIPS-42
© 2018 CA All rights reserved.
Fundamentals of Regulatory Readiness
7
1
How do you
prepare for an
audit?
2
What tips do you
suggest to
organizations
trying to achieve
regulatory
readiness?
3
What common
mistakes do
organizations
make?
© 2018 CA All rights reserved.
Data Discovery
Take appropriate measures to locate,
classify, and protect critical data.
Automation
Manage risk with on-demand security
incident reporting and event forwarding.
Access Control
Effectively manage privileged users
and secure sensitive information.
Best Practices for Achieving Compliance
8
© 2018 CA All rights reserved.
Question 3
9
What is the state of mainframe data management within your
organization?
A. We know where all our sensitive mainframe data resides.
B. We know where most of our sensitive mainframe data resides.
C. We know where some of our sensitive mainframe data resides.
D. We don’t know where our sensitive mainframe data resides.
© 2018 CA All rights reserved.
Idea Flexibility AbilityCross-Enterprise
Collaboration
10
Internal
Auditing
Compliance
Budget
Culture of
Compliance
Organizational Structure
© 2018 CA All rights reserved.
Question 4
11
Does your organization have a Chief Risk Officer?
A. Yes
B. No
C. We’re evaluating the role
D. I don’t know
© 2018 CA All rights reserved.
Gain a Competitive Advantage
12
Cost Reduction Digital Trust RevenueProductivity
Thank You.
VP of Product Management
Stuart.McIrvine@ca.com
Stuart McIrvine
@CAmainfrmae
slideshare.net/CAinc
www.ca.com/regulatorycompliance
linkedin.com/company/ca-technologies

More Related Content

PPTX
Cloud Security: A Business-Centric Approach in 12 Steps
PPTX
Smarter Security - A Practical Guide to Doing More with Less
PDF
Cross border - off-shoring and outsourcing privacy sensitive data
PDF
Seattle Tech4Good meetup: Data Security and Privacy
PDF
Enterprise Data Privacy Quiz
PPTX
MCGlobalTech Consulting Service Presentation
PPTX
10 Critical Corporate Cyber Security Risks
PDF
Fisma compliance solutions @ cdg.io
Cloud Security: A Business-Centric Approach in 12 Steps
Smarter Security - A Practical Guide to Doing More with Less
Cross border - off-shoring and outsourcing privacy sensitive data
Seattle Tech4Good meetup: Data Security and Privacy
Enterprise Data Privacy Quiz
MCGlobalTech Consulting Service Presentation
10 Critical Corporate Cyber Security Risks
Fisma compliance solutions @ cdg.io

What's hot (18)

PPTX
Two Peas in a Pod: Cloud Security and Mobile Security
PPTX
Leveraging Compliance to “Help” Prevent a Future Breach
PPTX
Protecting the Crown Jewels – Enlist the Beefeaters
PPTX
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
PPT
Data Risks In A Digital Age
PPTX
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
PPTX
Cybersecurity: What does Cyber Insurance Cover?
PDF
Where in the world is your PII and other sensitive data? by @druva inc
PPTX
Data Security: Are you Protected?
PDF
GDPR Webinar - feb
PPTX
Vendor Landscape: Email Security Gateway
PPTX
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PPTX
Marc Crudgington Who I Am
PPTX
Cybersecurity services
PDF
Network Security‬ and Big ‪‎Data Analytics‬
PDF
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
PPTX
Robert Nichols: Cybersecurity for Government Contractors
PPTX
Defensible cybersecurity-jan-25th-
Two Peas in a Pod: Cloud Security and Mobile Security
Leveraging Compliance to “Help” Prevent a Future Breach
Protecting the Crown Jewels – Enlist the Beefeaters
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Data Risks In A Digital Age
SEC OCIE - Cybersecurity Focus Areas, Guidance, and Best Practices
Cybersecurity: What does Cyber Insurance Cover?
Where in the world is your PII and other sensitive data? by @druva inc
Data Security: Are you Protected?
GDPR Webinar - feb
Vendor Landscape: Email Security Gateway
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
Marc Crudgington Who I Am
Cybersecurity services
Network Security‬ and Big ‪‎Data Analytics‬
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Robert Nichols: Cybersecurity for Government Contractors
Defensible cybersecurity-jan-25th-
Ad

Similar to The Trick to Passing Your Next Compliance Audit (20)

PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
PDF
PCI Compliance Report
PDF
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
PDF
Master Data in the Cloud: 5 Security Fundamentals
PDF
Key note in nyc the next breach target and how oracle can help - nyoug
PDF
Who is the next target proactive approaches to data security
PPTX
David valovcin big data - big risk
PPT
Shariyaz abdeen data leakage prevention presentation
PPT
Information security management v2010
PPTX
Gdpr action plan - ISSA
PDF
3 guiding priciples to improve data security
PPTX
A holistic approach to risk management 20210210 w acfe france & cyber rea...
PDF
Managed Security For A Not So Secure World Wp090991
PDF
AI and Data Privacy in 2025: Global Trends
PPTX
info-sys-security3.pptx
PPTX
cryptography.pptx
PDF
Internal Audit
PPSX
November 2017: Part 6
PDF
Security Fact & Fiction: Three Lessons from the Headlines
PPTX
Proactive Risk Management and Compliance in a World of Digital Disruption
Proven Practices to Protect Critical Data - DarkReading VTS Deck
PCI Compliance Report
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
Master Data in the Cloud: 5 Security Fundamentals
Key note in nyc the next breach target and how oracle can help - nyoug
Who is the next target proactive approaches to data security
David valovcin big data - big risk
Shariyaz abdeen data leakage prevention presentation
Information security management v2010
Gdpr action plan - ISSA
3 guiding priciples to improve data security
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Managed Security For A Not So Secure World Wp090991
AI and Data Privacy in 2025: Global Trends
info-sys-security3.pptx
cryptography.pptx
Internal Audit
November 2017: Part 6
Security Fact & Fiction: Three Lessons from the Headlines
Proactive Risk Management and Compliance in a World of Digital Disruption
Ad

More from SBWebinars (20)

PDF
Securing Mobile Apps, From the Inside Out
PPTX
SAP Concur’s Cloud Journey
PDF
Top Cybersecurity Threats and How SIEM Protects Against Them
PPTX
Software-Defined Segmentation Done Easily, Quickly and Right
PDF
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
PDF
Taking Open Source Security to the Next Level
PPTX
The Next Generation of Application Security
PDF
You're Bleeding. Exposing the Attack Surface in your Supply Chain
PDF
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
PDF
Top 10 Threats to Cloud Security
PDF
Deploying Secure Modern Apps in Evolving Infrastructures
PDF
Reduce the Burden Of Managing SAP With Enterprise Identity Management
PDF
Maturing DevSecOps: From Easy to High Impact
PDF
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
PDF
Reducing Risk of Credential Compromise at Netflix
PDF
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
PDF
The State of Open Source Vulnerabilities Management
PDF
Flow Metrics: What They Are & Why You Need Them
PDF
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
PDF
Building Blocks of Secure Development: How to Make Open Source Work for You
Securing Mobile Apps, From the Inside Out
SAP Concur’s Cloud Journey
Top Cybersecurity Threats and How SIEM Protects Against Them
Software-Defined Segmentation Done Easily, Quickly and Right
Don’t Get Stuck in The Encryption Stone Age: Get Decrypted Visibility with Am...
Taking Open Source Security to the Next Level
The Next Generation of Application Security
You're Bleeding. Exposing the Attack Surface in your Supply Chain
Demystifying PCI Software Security Framework: All You Need to Know for Your A...
Top 10 Threats to Cloud Security
Deploying Secure Modern Apps in Evolving Infrastructures
Reduce the Burden Of Managing SAP With Enterprise Identity Management
Maturing DevSecOps: From Easy to High Impact
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
Reducing Risk of Credential Compromise at Netflix
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
The State of Open Source Vulnerabilities Management
Flow Metrics: What They Are & Why You Need Them
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Building Blocks of Secure Development: How to Make Open Source Work for You

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PDF
STKI Israel Market Study 2025 version august
PDF
Five Habits of High-Impact Board Members
PPT
Geologic Time for studying geology for geologist
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPT
What is a Computer? Input Devices /output devices
PDF
Architecture types and enterprise applications.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Zenith AI: Advanced Artificial Intelligence
CloudStack 4.21: First Look Webinar slides
Enhancing plagiarism detection using data pre-processing and machine learning...
Custom Battery Pack Design Considerations for Performance and Safety
OpenACC and Open Hackathons Monthly Highlights July 2025
STKI Israel Market Study 2025 version august
Five Habits of High-Impact Board Members
Geologic Time for studying geology for geologist
Credit Without Borders: AI and Financial Inclusion in Bangladesh
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
sbt 2.0: go big (Scala Days 2025 edition)
What is a Computer? Input Devices /output devices
Architecture types and enterprise applications.pdf
search engine optimization ppt fir known well about this
A review of recent deep learning applications in wood surface defect identifi...
The influence of sentiment analysis in enhancing early warning system model f...
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Module 1.ppt Iot fundamentals and Architecture
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...

The Trick to Passing Your Next Compliance Audit

  • 1. Modern Software Factory for Mainframe The Trick to Passing Your Next Compliance Audit What will you say when an auditor comes knocking on your door?
  • 2. © 2018 CA All rights reserved. Stuart McIrvine VP of Product Management CA Technologies Today’s Speakers Mike Vizard IT Editor SecurityBoulevard.com 2
  • 3. © 2018 CA All rights reserved. Your Mainframe is at Risk 3 “Big iron is still very secure…unfortunately we have this thing called people that surround the mainframe.” – Patrick Gray, Ex FBI Security Agent People Insider threats range from malicious users to well-intentioned employees making a mistake. Data 70% of today’s corporate data – including sensitive and regulated data like PII – reside on the mainframe. Systems The mainframe is increasingly connected into the digital economy – applications, mobile devices, Big Data. SecuretheMainframe
  • 4. © 2018 CA All rights reserved. Question 1 4 Does your organization have formal processes in place to secure mainframe data from internal threats? A. Yes B. No C. It’s a work in progress D. I don’t know
  • 5. © 2018 CA All rights reserved. Who are the involved parties? GDPR UK Data Protection Act 1998 PCI DSS EU-U.S. Privacy Shield • Prove that data is being protected • Appoint a Data Protection Officer • Fines of 4% of annual turnover • Information Commissioners Office • Wide scope • Consent • Cross-industry • Protect stored cardholder data • Encrypt transmissions • Maintain InfoSec policy • U.S. Department of Commerce and European Commission • Individual choice & control • Security The Regulatory Ecosystem 5 Know which regulations apply to your business.
  • 6. © 2018 CA All rights reserved. Question 2 6 Which of the following mandates apply to your organization? (Check all that apply)  GDPR  HIPAA  PCI DSS  SOX  FIPS-42
  • 7. © 2018 CA All rights reserved. Fundamentals of Regulatory Readiness 7 1 How do you prepare for an audit? 2 What tips do you suggest to organizations trying to achieve regulatory readiness? 3 What common mistakes do organizations make?
  • 8. © 2018 CA All rights reserved. Data Discovery Take appropriate measures to locate, classify, and protect critical data. Automation Manage risk with on-demand security incident reporting and event forwarding. Access Control Effectively manage privileged users and secure sensitive information. Best Practices for Achieving Compliance 8
  • 9. © 2018 CA All rights reserved. Question 3 9 What is the state of mainframe data management within your organization? A. We know where all our sensitive mainframe data resides. B. We know where most of our sensitive mainframe data resides. C. We know where some of our sensitive mainframe data resides. D. We don’t know where our sensitive mainframe data resides.
  • 10. © 2018 CA All rights reserved. Idea Flexibility AbilityCross-Enterprise Collaboration 10 Internal Auditing Compliance Budget Culture of Compliance Organizational Structure
  • 11. © 2018 CA All rights reserved. Question 4 11 Does your organization have a Chief Risk Officer? A. Yes B. No C. We’re evaluating the role D. I don’t know
  • 12. © 2018 CA All rights reserved. Gain a Competitive Advantage 12 Cost Reduction Digital Trust RevenueProductivity
  • 14. VP of Product Management Stuart.McIrvine@ca.com Stuart McIrvine @CAmainfrmae slideshare.net/CAinc www.ca.com/regulatorycompliance linkedin.com/company/ca-technologies