Articles & Content
Topic: 2008 NA
Subtopic: DB2 for LUW
DATE: 2008-5-19 (04:00 PM - 05:00 PM)
SPEAKERS: Deb Jenson (IBM)
Recent high-profile data thefts and current compliance regulations have put increased pressure on companies to ensure that corporate databases are protected from intrusion. Information security teams are faced with the challenge of protecting and auditing critical enterprise data - such as corporate financials, personal identity information, credit card numbers, and intellectual property information - from both insiders and outsiders. In this presentation, we’ll discuss the most pervasive regulations and some best practice guidelines you can use to make certain your DB2 database on distributed platforms are secure and compliant. Technologies such as access control, auditing, encryption and others will be covered, as well as how they apply to each of these regulations. If data security and auditing is a concern for your company, you will not want to miss this presentation covering how to safeguard your DB2 data.
EXP. LEVEL: Intermediate
Understand what regulatory compliance and security threats your company needs to be concerned with.
Understand the requirements of each regulatory compliance and how it impacts your database security plan.
Learn about DB2 technology that can be used to ensure your database is safe from security threats and meets compliance requirements.
Use the best practices guidelines to understand what you need to implement for each regulatory compliance and security threat.
Learn about how to better security and protect your database from both internal and external security threats.
This file is being provided by IDUG. We would encourage you to join IDUG to get full access to all of our files and resources. Joining IDUG is FREE and signing up is simple. Click here to join! or login!Click to Download
NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.