Have you ever got one of those letters, \u201cWe are writing to inform you of a security incident involving certain personal information you provided\u2026?\u201d You likely have and you know how you felt about the business at that moment.\nHave you ever had to send one? Imagine having to do that and think about all those customers contemplating your business at that moment. Now imagine that you\u2019re Postbank, the banking division of South Africa's Post Office. They had taken precautions to protect their and customers\u2019 data but they now face losses of more than $3 million and must replace 12 million credit cards at an expected cost of approximately $58 million. Fines and loss of customer trust are yet to be determined.\nThey had protected data with encryption and protected the encryption keys with a master key. Then, one or more employees (likely with privileged user access) gained access during a datacenter move and printed the master key \u2013 the key to rule all keys. There was nothing elegant here, no ring of organized criminals, no sophisticated breaching tools \u2013 just opportunity and a printer.\nNo one wants to be faced with that. Losses. Fines. Customer trust. Can your business withstand it? And this is just one example. A quick search on the web shows that stolen Personally Identifiable Information from 386 million consumers was posted online in a hacker forum \u2013 for free. In July 2020 alone.\nChange is Risky Business\nWith the level of change today, is it even possible to protect against breaches and risks? Cyber-attacks come from pseudo-amateurs with opportunity and from organized criminals with an evolving arsenal of tools. A large part of the global workforce is now working off-site exposing our networks, systems, and data to new threat vectors and inconsistent protections. Every day brings new challenges, new disruptions, new risks.\nSo how do we solve the challenge so we can avoid imagining ourselves in the unenviable position of sending out a breach letter?\nWhen it comes to security, it is critically important to always be prepared and a step ahead of change. Why? Change introduces risk. Change is often unpredictable as we\u2019ve seen in recent months with an instantaneous shift to full-time remote knowledge workers! This is why we always need to be prepared. But how do we get to a state of prepared bliss when day-to-day tasks keep us busy?\nMinimize disruptions.\nIf we reduce firefighting, we can allocate the time saved to strategic planning and implementation to keep security top-notch and further reduce our risk and our firefighting. Security is the constant element amongst all others in our business that cannot fail. The stakes to our brand, regardless of what regulations govern our business, are too high!\nWhen applied to mainframes, these stakes amplify. Mainframes secure over 70% of the world\u2019s mission-critical data. They support our global economy processing 90% of global credit card transactions and hosting core banking applications for more than 90% of the world\u2019s top 100 banks. It is unlikely that any of us can go through an entire day without interacting with a Mainframe.\nThe good news is that with strategic planning, we can maintain a solid security foundation. The Mainframe has always been a pillar others look up to when it comes to security. It is arguably the most securable IT platform. But digital transformation and unpredictable global events are driving environmental shifts! This can increase risk if we don\u2019t keep pace and ensure we implement modern security on all IT platforms.\nWhat\u2019s keeping us busy and holding us back?\nMany factors fuel firefighting and hold us back from strategic planning.\n\nCybersecurity skeleton crews\nComplexity and lack of automation\nModern threats without the implementation of modern protections\n\nCybersecurity Skeleton Crew\nHigh demand has created a shortage of skilled cybersecurity workers. This poses a real challenge as training new employees and building experience takes time before you have a knowledgeable, productive worker ready to make solid, independent security decisions. Where do I find qualified staff? How can I train employees in the skills I need? These are common questions when seeking cybersecurity staff for critical Mainframe infrastructure.\nComplexity and Lack of Automation\nThat crosscut handsaw is an outstanding tool when you\u2019re putting up a mailbox post. And it will do the job when you\u2019re building a garage \u2013 but wouldn\u2019t some automation be better? Same question for IT security \u2013 wouldn\u2019t automation help us get more done and make addressing complex tasks easier? Just as with skilled workers, automation is another key element that requires an upfront investment. It becomes apparent very quickly how automation frees up time for strategic initiatives.\nSome large enterprises have 90% of their user accounts and entitlements that need cleanup. Imagine how long that takes to do manually and what doesn\u2019t get done as a result. Complexity makes it difficult to see all the risks, and pockets of manual work slow us down and prevent us from being strategic.\nModern Threats without the Implementation of Modern Protections\nFirefighting will ensue if we try to solve modern risks with archaic processes. Even the Mainframe, the pillar of security strength, must modernize security efforts as the context of the environment in which it runs continuously changes. As we\u2019ve connected the Mainframe into networks to expose more value to more users and customers, we\u2019ve also created more risk. We need to respond to the security, risk, compliance, and privacy needs of today with tools to match. The Mainframe is no longer the machine behind the curtain!\nI've noted some real challenges. It\u2019s ok to feel overwhelmed but never defeated. There are steps we can take that will free up some time to ensure we can once again plan, keep pace with change, and even move one step ahead! A platform can only be as secure as we make it through deploying a modern strategy.\nSolutions\nBuilding Beyond the Cybersecurity Skeleton Crew\nThe demand isn\u2019t decreasing, so how do we resolve the shortage of cybersecurity workers. Vendors may offer training. For example, at Broadcom, we take steps to help organizations upskill. We offer free online product education \u2013 but we also train to a much deeper level. We will train your staff face-to-face as part of our New Hire training. The same classes we deliver for our Associate Software Engineers. Seven weeks of intense training on everything Mainframe \u2013 including soft skills, technical topics such as z\/OS basics, security, TPX, TSO\/ISPF, REXX, and Assembler.\nOr, if you are having trouble finding talent, we will invest with you through our Vitality Residency Program. Through the program, we will hire new talent and train them to be Mainframe experts in our products. Once they are fully trained, with initial experience gained through an on-site residency at your business, they transition and become one of your employees fully certified in our solutions -- all at little to no cost to you.\nTrained workers result in a huge return on the time investment \u2014 employees develop skills in the exact areas your organization needs, have access to our experts and a mentor even after they transition to your organization, and gain knowledge that takes the guesswork out of their day-to-day tasks... which means less risk. Think about the rapid scramble caused by COVID-19. In such events, we may not be able to scale to rapid security requests with existing skills. Think about the competitive advantage to your organization by taking advantage of a skill-building offer!\nSolving Complexity and Simplifying through Automation\nIntegrating your Mainframe into your SOC or SIEM can solve many issues. Having a consistent dashboard across the enterprise ensures we\u2019re taking advantage of all available skills and offers opportunities to address vulnerabilities before they become threats. Mainframe security tools from Broadcom support interoperability and integration of data with many popular SIEMS such as Splunk, QRadar, LogRhythm, and others to help you simplify and automate across the enterprise.\nAutomation is also a good way to gain a large buy-back in time. So \u2014 where do we start? Configuration compliance can deliver significant ROI through automation. Let the tools do the work. Get started with MRI Security Essentials and see right through the complexity. Customers have reported a 94% reduction in the time it took to monitor and check their security configuration settings \u2014 using an automated tool such as MRI Security Essentials versus manual labor. Or consider applying a tool like CA Cleanup to that user account and entitlements problem.\nModern Threats Solved with Modern Protections\nMainframes are the most securable IT platform, but it isn\u2019t automatic. We need to ensure we deploy on Mainframes the same protections we apply to hybrid\/cloud systems. A re-evaluation of Mainframe security will highlight modernization efforts that can deliver savings in time and a reduction in risk in the digitally transformed world.\nA simple assessment can determine if commonly used distributed security controls \u2013 Multi-Factor Authentication, privileged user management, or data classification \u2013 are also deployed in the Mainframe environment?\u00a0 You may find that as attention has been focused elsewhere on distributed systems or cloud hot spots, some gaps appeared and need to be filled in Mainframe environments.\u00a0\nMRI Security Essentials is a great starting point and you can also examine tools to help you advance the entire Mainframe security lifecycle on the Broadcom Mainframe Security website.\u00a0 Our solutions work with all three Mainframe ESMs \u2013 Top Secret, ACF2, and RACF.\nMainframe environments often process over 100,000 security calls a second! That\u2019s a lot of reason to justify a solid security strategy and a re-evaluation of your efforts. Remember, busy is only in the eye of the beholder and may not move you towards your security goals! Strategic, on the other hand, will result in fulfilling your security goals and better long-term success!\nStop the Firefighting and Advance Your Mainframe Security Today!