View Printable Version

C7 - Security in the Cloud – Protecting your Data from the World

Session Number: 5044
Track: Db2 for LUW I
Session Type: Podium Presentation
Primary Presenter: Chris Eaton [IBM]
Time: Oct 03, 2017 (03:40 PM - 04:40 PM)

Speaker Bio: Chris Eaton is a Worldwide Technical Leader for IBM’s Cloud Data Services organization. Chris has been working with DB2 on the Linux, UNIX, Windows platform for over 25 years. From customer support to development manager, to Externals Architect and Product Manager for DB2, Chris has spent his career listening to customers and working to make DB2 a better product. Chris is the authored several books on DB2 and Big Data and has one of the most popular blogs about DB2 on IT Toolbox at http://it.toolbox.com/blogs/db2luw. In his current role, Chris leads a worldwide team of technical specialists delivering IBM’s Analytics portfolio of products in the cloud. Chris is also a proud member of the IDUG Speaker Hall of Fame and has been fortunate to have been selected as Best Speaker at 3 different IDUG conferences by the attendees.
Audience experience level: Beginner, Intermediate
Presentation Platform: DB2 for Linux, UNIX, Windows
Presentation Category: Security
Audiences this presentation will apply to: Application Developers, Data Architects, Database Administrators, IT Managers
Objective 1: • Understanding cloud security issues
Objective 2: • Security administration in the cloud
Objective 3: • Authentication and authorizations
Objective 4: • Encryption, VPNs and data masking
Objective 5: • Trusted context and connection procs to control access

Abstract:  When I talk to clients about cloud the first question they always ask is about security. Then the second question and the third questions are also about security. Join Chris in this session where he will talk about the various DB2 security aspects that you need to be concerned about in the cloud and how to protect your data against various threats. Chris will cover basic security administration in the cloud and then also cover how to leverage various features in DB2 and dashDB (also based on DB2) to secure your data. Topics like encryption on disk and on the wire, trusted context, connection procedures, row and column access control as well as network security will be covered.

For questions or concerns about your event registration, please contact support@idug.org