Enviar búsqueda
Cargar
Hacking the Mainframe: Gaps in your Defense
•
1 recomendación
•
462 vistas
Título mejorado por IA
P
Philip Young
Seguir
CA World talk about mainframe hacking and how its actually not impossible.
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 39
Descargar ahora
Descargar para leer sin conexión
Recomendados
How Do US and EU Cybersecurity and Data Protection Policy Developments Impact...
How Do US and EU Cybersecurity and Data Protection Policy Developments Impact...
CA Technologies
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
Tunde Ogunkoya
A Risk-Based Mobile App Security Testing Strategy
A Risk-Based Mobile App Security Testing Strategy
NowSecure
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
NowSecure
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
NowSecure
Pre-Con Ed: CA Live API Creator: Build and Deploy Enterprise-class APIs With...
Pre-Con Ed: CA Live API Creator: Build and Deploy Enterprise-class APIs With...
CA Technologies
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
MassTLC
App sec owasp from developers prospective
App sec owasp from developers prospective
Security Innovation
Recomendados
How Do US and EU Cybersecurity and Data Protection Policy Developments Impact...
How Do US and EU Cybersecurity and Data Protection Policy Developments Impact...
CA Technologies
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
Tunde Ogunkoya
A Risk-Based Mobile App Security Testing Strategy
A Risk-Based Mobile App Security Testing Strategy
NowSecure
Android P Security Updates: What You Need to Know
Android P Security Updates: What You Need to Know
NowSecure
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
NowSecure
Pre-Con Ed: CA Live API Creator: Build and Deploy Enterprise-class APIs With...
Pre-Con Ed: CA Live API Creator: Build and Deploy Enterprise-class APIs With...
CA Technologies
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
MassTLC
App sec owasp from developers prospective
App sec owasp from developers prospective
Security Innovation
Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe
CA Technologies
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
CA Technologies
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
CA Technologies
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
CA Technologies
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
CA Technologies
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
CA Technologies
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
CA Technologies
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
CA Technologies
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
CA Technologies
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
CA Technologies
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
CA Technologies
Tracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APM
CA Technologies
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
CA Technologies
The Top Three Cloud Security Mythbusters
The Top Three Cloud Security Mythbusters
Trustmarque
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
CA Technologies
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
CA Technologies
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Technologies
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Más contenido relacionado
Similar a Hacking the Mainframe: Gaps in your Defense
Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe
CA Technologies
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
CA Technologies
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
CA Technologies
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
CA Technologies
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
CA Technologies
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
CA Technologies
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
CA Technologies
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
CA Technologies
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
CA Technologies
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
CA Technologies
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
CA Technologies
Tracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APM
CA Technologies
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
CA Technologies
The Top Three Cloud Security Mythbusters
The Top Three Cloud Security Mythbusters
Trustmarque
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
CA Technologies
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
CA Technologies
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Technologies
Similar a Hacking the Mainframe: Gaps in your Defense
(20)
Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Securely Enabling the Digital Age
Securely Enabling the Digital Age
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator: Learn How to Integrate Data From Enterprise...
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Tracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APM
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
The Top Three Cloud Security Mythbusters
The Top Three Cloud Security Mythbusters
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
Último
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Pixlogix Infotech
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Último
(20)
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Hacking the Mainframe: Gaps in your Defense
1.
World® ’16 Gaps in your Defense: Hacking the Mainframe Philip Young, Co-Founder, ZedSec 390 MFT1755 MAINFRAME AND WORKLOAD AUTOMATION
2.
2 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respecve companies. The content provided in this CA World 2016 presentaon is intended for informaonal purposes only and does not form any type of warranty. The informaon provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informaonal Purposes Only Terms of this Presentaon
3.
3 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD Abstract The mainframe is the mission-essenal backbone of the enterprise, housing over 70 percent of corporate data, touching more than half of all applicaons, and connecng to the internet and Internet of Things (IoT) through APIs. However, in the enterprise security discussion, the mainframe is oaen presumed to be inherently secure. This session will dive into the current state of mainframe of mainframe hacking, why hackers are taking a larger interest in the plaborm, a discussion of compliance versus security and next steps on how you can opmize the security of your most mission-essenal business asset. Philip Young ZedSec 390 Co-Founder
4.
4 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD Disclaimer I’m not here in the name of or on behalf of my employer. All opinions expressed here are my own. Philip Young ZedSec 390 Co-Founder
5.
5 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD
6.
6 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD
7.
7 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD
8.
8 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD
9.
9 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD
10.
10 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD
11.
11 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD Logica Security Incident Inves3ga3on: Bilaga_A.pdf Source: h=ps://wikileaks.org/goArid-docs/
12.
12 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD Castle Walls Under Digital Siege: Risk-based Security for z/OS – CA World ‘15 Source: h=ps://www.youtube.com/watch?v=CySiZOaY2T0
13.
13 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD Common Myths IT’S NOT ON THE INTERNET IT’S IMPENETRABLE HACKERS DON’T KNOW ABOUT IT HACKERS DON’T KNOW ABOUT IT BUT WE’RE AUDITED ALL THE TIME!?
14.
14 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD The ‘IMP’ § Started in 2013 §
Tools: – MassScan – Nmap – Python – X3270 – Linux VPS § Database of 400+ mainframes hkps://mainframesproject.tumblr.com/ Internet Mainframes Project
15.
15 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD
16.
16 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD
17.
17 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD
18.
18 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD
19.
19 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD It Doesn’t Ma=er
20.
20 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD Enterprises are Flat § Many large enterprises experienced a breach in 2015 §
Flat networks § No firewall between “Corporate” network and mainframe
21.
21 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD Hacking the Unhackable § From the network §
No knowledge of the system § Steps – Gather informaon – Profile the system – Launch akacks Tools released/updated in 2015/2016
22.
22 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD Nmap in 2015/2016 • Anon? • SITE? • OS Version? • Informaon • VTAM? • CICS? • TSO? • Version? • Nikto? • BURP? • Enumerate? • Java Objects
23.
23 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD TN3270 Screen
24.
24 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD VTAM Enumeraon
25.
25 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD TSO User Enumeraon
26.
26 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD
27.
27 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD CICS Transacon Enumeraon
28.
28 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD
29.
29 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD CICSpwn
30.
30 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD CICSpwn: TSO Shell
31.
31 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD CICSpwn: TSO Shell
32.
32 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD FTP Authorized Code Exec
33.
33 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD What Can I Do? § Compliance is literally the start §
Just because you’re compliant doesn’t mean: – The compliance rules are well done – Represent current threats – Match current baselines § Vulnerability Scanning?
34.
34 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD Gap Assessment § Compare your requirements to a standard §
How do you compare and contrast? § Who’s experse are you relying on?
35.
35 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD Go Beyond Compliance § zAssure? §
Idenfying Data Assets? § Logging and Monitoring? – zSecure – IronStream – Vanguard § Penetraon Tesng?
36.
36 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD Quesons?
37.
37 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD CICSpwn h=ps://github.com/ayoul3/ cicspwn Nmap Scripts h=ps://github.com/ zedsec390/NMAP Metasploit h=ps://github.com/rapid7/ metasploit-framework Contact & References Twi=er: @mainframed767 E-Mail: mainframed767@gmail.com
38.
38 © 2016 CA. ALL RIGHTS RESERVED. @CAWORLD #CAWORLD Stay connected at communies.ca.com Thank you.
39.
@CAWORLD #CAWORLD © 2016 CA. All RIGHTS RESERVED. 39 @CAWORLD #CAWORLD Mainframe and Workload Automa3on For more informaon on Mainframe and Workload Automaon, please visit: hkp://cainc.to/9GQ2JI
Descargar ahora