View Printable Version

EDS5 - How to perform a DB2 Security Audit

Session Number: 3200
Track: Educational Seminar - II
Session Type: Educational Seminar
Primary Presenter: Dave Beulke [Dave Beulke and Associates]

Frio - Ed. Sems. => Tue, May 24, 2016 (02:15 PM - 04:45 PM)

Speaker Bio: Dave Beulke is a system strategist, application architect, and performance expert specializing in Big Data, data warehouses, and high performance internet business solutions. He is an IBM Gold Consultant, Information Champion, President of DAMA-NCR, former President of International DB2 User Group, and frequent speaker at national and international conferences. His architectures, designs, and performance tuning techniques help organization better leverage their information assets, saving millions in processing costs. Follow him on Twitter here (@DBeulke) or connect through LinkedIn here (

Audience experience level: Beginner, Intermediate, Advanced
Presentation Category: Application Design, Data Management, Data Warehousing and Business Intelligence, Disaster Recovery, Emerging Technology, Implementing New DB2 Releases and Features, Information Integration, Managing Availability, Managing Database Resources, Managing Performance, Big Data
Presentation Platform: Select a Value
Audiences this presentation will apply to: Application Developers, Data Architects, Database Administrators, Systems Programmers, New Users, IT Managers
Technical areas this presentation will apply to: Data Warehousing and Business Intelligence, Database Performance (DB2 for z/OS), Disaster Recovery (DB2 for z/OS), High Availability (DB2 for z/OS), New Release (DB2 for z/OS), Security (DB2 for z/OS)
Objective 1: Learn DB2 Security Best Practices for the systems, databases and applications
Objective 2: Understand how to implement a multi-layered DB2 security scheme
Objective 3: How to perform a security audit of your overall processing environment
Objective 4: Learn of the latest hardware and software technology options to safeguard your data
Objective 5: Understand all the system, database, table, row and column security options

Abstract:  This half day seminar details the DB2 z/OS security best practices. It discusses the current state of systems, database tables and how best to protect your PII data from hackers. The seminar also discusses the hardware and software technology options along with encryption, stenography, and security audit reports that can quickly identify security issues.
The student will learn many design, system settings, application development practices and authorization procedure techniques that they can implement at their company to safeguard their systems and protect their data. These many DB2 z//OS best practices are vital for anyone that is serious about protecting their PII data.

For questions or concerns about your event registration, please contact