Database Governance – How to Put the Right Controls in Place to Protect your Data
- LANGUAGE: English DATE: Tuesday, March 15, 2011 TIME: 3pm CET, 10am EST
In this webinar, Martin Kuppinger will, for the first time ever, introduce the concept of Database Governance, the reasons why you should do that and the connection to Governance initiatives as well as Database Security technologies. He will as well talk about the areas where new conceptual and technical approaches will be required.
Roxana Bradescu of Oracle then will talk about practical approaches to make Database Governance work today – to enhance your level of protection of the valuable information assets.
When looking at several of the incidents which became public during the last 2 years, many of them obviously are based on the fact that someone could access data in databases and bypassed other levels of protection like network security or application security. In addition, regulatory compliance and the auditors are increasingly looking at the protection of databases. The idea of data ownership has significantly gained momentum, to name one example. Thus it is time to introduce the concept of Database Governance and to put this into the context of your overall Corporate and IT Governance initiatives. Database Governance is a core element of Information Governance. It is about defining controls and policies to adequately protect information in databases and the flow of this information. Like any approach to governance, Database Governance is a mix of organization and supporting technology, to define controls and to make them effective.
In this webinar, Martin Kuppinger will, for the first time ever, introduce the concept of Database Governance, the reasons why you should do that and the connection to Governance initiatives as well as Database Security technologies. He will discuss the areas where new conceptual and technical approaches will be required.
Roxana Bradescu of Oracle then will talk about practical approaches to make Database Governance work today – to enhance the level of protection of your valuable information assets.
Speakers
Gold Sponsor

Downloads
Trending Videos
Next Webinar
Effective Threat Detection for Enterprises Using SAP Applications
Jun 28, 2022
Determined cyber attackers will nearly always find a way into company systems and networks using tried and trusted techniques. It is therefore essential to assume breach and have the capability to identify, analyze, and neutralize cyber-attacks before they can do any serious damage.