DB2 Security Challenges

Session Number: 388
Track: Technical Networking Opportunities
Session Type: Podium Presentation
Primary Presenter: Rebecca Bond [Consultant - DB2 Locksmith]
Co-Presenter: Walid Rjaibi [Chief Security Architect for Information Management - IBM]
Co-Presenter 2: Roger Sanders [EMC Corporation]
Time: May 01, 2013 (03:30 PM - 04:30 PM)
Room: Bonaire 7&8

Audience experience level: Beginner, Intermediate, Advanced
Presentation Category: Data Management
Presentation Platform: Cross Platform
Audiences this presentation will apply to: Data Architects, Database Administrators, Systems Programmers, New Users, IT Managers
Technical areas this presentation will apply to: Security (DB2 for LUW), Security (DB2 for z/OS)

Abstract:  DB2 Security Challenges:
When (and why) would you use row and column access control vs. label-based access control?
Who in an organization should hold SECADM authority?
What are some best practices for managing SECADM activities when you are the only DBA at your company/in your department?
Ways to manage Separation of Duties at the database layer. 
DB2 LUW Configuration items a system auditor is guaranteed to check.
Authentication, Authorization, Auditing, Encryption.