350: Database Auditing for Compliance, Security, & Reputation Management
Alexander Kopac , Database-Brothers, Inc Biography
Objectives: | Defining the �Problem� � Horror Stories, Fines, Fictions & Business Closure Facts Security vulnerabilities and Utility Issues in your RDBMS databases Various approaches for auditing, monitoring, reporting with specifics on 'Alerting' techniques |
Abstract: | The morning you wake up to a 'data breach' is not a good time to start thinking about ways to protect your critical database information systems. This session will guide you through current/pending privacy regulations and the safeguards necessary for compliance. It will also help you prepare a battle plan for avoiding a data breach. The session objectives are: -- Understanding current privacy and identity theft regulations -- Common database auditing, monitoring, & reporting requirements for compliance from the field -- Security Vulnerabilities in your databases -- Oracle and other RDBMS examples for protecting critical data for privacy -- Various approaches for Database auditing, monitoring, & reporting, various vendor approaches -- Oracle Auditing options -- Email notification of attempts/attacks -- Configuration & Utility issues -- 10 Questions to ask DBAs, Managers, Auditors and IT Security folks. |
Audiernce Focus: | Managers |
Expertise: | Beginner |
Track: | Database |
Date: | Wednesday, April 16, 2008 |
Time: | 8:30 AM - 9:30 AM |