Endpoint Security , Governance & Risk Management , Legacy Infrastructure Security

What About Mainframe Security?

CA's Chip Mason on the Risks of Neglecting Those Legacy Data Processors

By some estimates, 70 percent of enterprise data still resides on the mainframe. That means mainframe security needs to be a hot-button cybersecurity issue, says Chip Mason of CA Technologies.

See Also: 2024 Threat Hunting Report: Insights to Outsmart Modern Adversaries

In a video interview at Information Security Media Group's recent Washington Fraud and Breach Prevention Summit, Mason, a director of product management at CA Technologies, discusses:

  • Why mainframes need to be critical security considerations;
  • The security risks inherent in many mainframes;
  • CA's new approach to mainframe security.

Mason has over 20 years of experience in the software industry. He leads strategy and product definition for mainframe security products at CA Technologies. In this capacity, he works to guide integration and product development toward delivering valuable security solutions, as well as acting as a subject matter expert assisting customers to ensure security and compliance. Mason has experience across many areas of enterprise IT, including security management; application, web and mobile software development; service management; software and infrastructure provisioning; networking; and event management. He is certified in Scaled Agile Framework and ITIL.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.