Articles & Content
Topic: Cross Platform DB2 for z/OS & LUW
DATE: 2009-5-12 (02:45 PM - 03:45 PM)
SPEAKERS: Dean Ocampo (Imperva)
Corporate databases and their contents are under siege. From outside the organization, criminals can exploit web applications to steal confidential information for financial gain. From the inside, databases can be compromised by employees and contractors with malicious intent. SQL Injection, platform vulnerabilities, buffer overflows... databases are vulnerable to a myriad of threats and attack vectors. This presentation will use live demonstrations to trace the steps involved in breaking into a database, and present a reference architecture and checklist for implementing iron-clad database security measures.
EXP. LEVEL: Intermediate
Understand the tools, process, and methods used to break into a database
Know what threats you need to address to secure your database
Have a checklist of security requirements for deploying an iron-clad database security architecture
Learn about resources for researching database security and audit issues
See a live database break-in and attack techniques
Click Here to Download
NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.