IDUG DB2 Tech Conference EMEA 2011
Clarion Congress Hotel, Prague, Czech Republic
14 - 18 November, 2011

View Printable Version

Data Governance for DBAs – Securing Production Data Assets

Session Number: 2204
Track: DB2 9.7 for LUW (C)
Session Type: Podium Presentation
Primary Presenter: Chris Eaton [WW Technical Sales Specialist - IBM]

Aquarius => Tue, Nov 15, 2011 (02:15 PM - 03:15 PM)

Speaker Bio: Chris Eaton is worldwide technical specialist focused on Information Governance. Specifically Chris is focused on managing the data lifecycle, and security and privacy concerns around the DB2 database. Chris has been working with DB2 on the Linux, UNIX, Windows platform for over 19 years and is the author of IBM DB2 9 New Features, DB2 9.7 New Features, and The High Availability Guide for DB2 and has one of the most popular blogs about DB2 on IT Toolbox at
Audience experience level: Beginner, Intermediate
Presentation Category: Data Management
Presentation Platform: Select a Value
Audiences this presentation will apply to: Data Architects, Database Administrators, New Users, IT Managers
Technical areas this presentation will apply to: New Release (DB2 for LUW), Security (DB2 for LUW)
Objective 1: The basics of database security – authorization and authentication
Objective 2: Auditing to know who has done what
Objective 3: Activity monitoring – detect suspicious activity from your authorized end users
Objective 4: Understanding your encryption requirements – what must be encrypted and what should be encrypted
Objective 5: Understanding the encryption capabilities available with DB2

Abstract:  Your first line of defense to protect your sensitive data is to obviously lock the front door. That is, have authentication and authorization so you know who is getting into your database and what they are allowed to do. But there is more you can do. Many people have home alarms and video surveillance in addition to putting their valuables in a safe. You can do the same with your DB2 database. This session will cover not only the basics of data governance and security but also cover advanced topics like intrusion detection, activity monitoring, auditing and encryption.

For questions or concerns about your event registration, please contact