IDUG DB2 Tech Conference EMEA 2011
    Clarion Congress Hotel, Prague, Czech Republic
    14 - 18 November, 2011

    View Printable Version

    Data Governance for DBAs – Securing Production Data Assets

    Session Number: 2204
    Track: DB2 9.7 for LUW (C)
    Session Type: Podium Presentation
    Primary Presenter: Chris Eaton [WW Technical Sales Specialist - IBM]
    Room(s)/
    Time(s):

    Aquarius => Tue, Nov 15, 2011 (02:15 PM - 03:15 PM)

    Speaker Bio: Chris Eaton is worldwide technical specialist focused on Information Governance. Specifically Chris is focused on managing the data lifecycle, and security and privacy concerns around the DB2 database. Chris has been working with DB2 on the Linux, UNIX, Windows platform for over 19 years and is the author of IBM DB2 9 New Features, DB2 9.7 New Features, and The High Availability Guide for DB2 and has one of the most popular blogs about DB2 on IT Toolbox at http://it.toolbox.com/blogs/db2luw
    Audience experience level: Beginner, Intermediate
    Presentation Category: Data Management
    Presentation Platform: Select a Value
    Audiences this presentation will apply to: Data Architects, Database Administrators, New Users, IT Managers
    Technical areas this presentation will apply to: New Release (DB2 for LUW), Security (DB2 for LUW)
    Objective 1: The basics of database security – authorization and authentication
    Objective 2: Auditing to know who has done what
    Objective 3: Activity monitoring – detect suspicious activity from your authorized end users
    Objective 4: Understanding your encryption requirements – what must be encrypted and what should be encrypted
    Objective 5: Understanding the encryption capabilities available with DB2

    Abstract:  Your first line of defense to protect your sensitive data is to obviously lock the front door. That is, have authentication and authorization so you know who is getting into your database and what they are allowed to do. But there is more you can do. Many people have home alarms and video surveillance in addition to putting their valuables in a safe. You can do the same with your DB2 database. This session will cover not only the basics of data governance and security but also cover advanced topics like intrusion detection, activity monitoring, auditing and encryption.

    For questions or concerns about your event registration, please contact support@idug.org


    Copyright © 2014 IDUG. All Rights Reserved

    All material, files, logos and trademarks within this site are properties of their respective organizations.

    Terms of Service - Privacy Policy - Contact