Database Governance – How to Put the Right Controls in Place to Protect your Data

  • LANGUAGE: English DATE: Tuesday, March 15, 2011 TIME: 3pm CET, 10am EST
Upcoming Webinars
In this webinar, Martin Kuppinger will, for the first time ever, introduce the concept of Database Governance, the reasons why you should do that and the connection to Governance initiatives as well as Database Security technologies. He will as well talk about the areas where new conceptual and technical approaches will be required.
Roxana Bradescu of Oracle then will talk about practical approaches to make Database Governance work today – to enhance your level of protection of the valuable information assets.

When looking at several of the incidents which became public during the last 2 years, many of them obviously are based on the fact that someone could access data in databases and bypassed other levels of protection like network security or application security. In addition, regulatory compliance and the auditors are increasingly looking at the protection of databases. The idea of data ownership has significantly gained momentum, to name one example. Thus it is time to introduce the concept of Database Governance and to put this into the context of your overall Corporate and IT Governance initiatives. Database Governance is a core element of Information Governance. It is about defining controls and policies to adequately protect information in databases and the flow of this information. Like any approach to governance, Database Governance is a mix of organization and supporting technology, to define controls and to make them effective.

In this webinar, Martin Kuppinger will, for the first time ever, introduce the concept of Database Governance, the reasons why you should do that and the connection to Governance initiatives as well as Database Security technologies. He will discuss the areas where new conceptual and technical approaches will be required.

Roxana Bradescu of Oracle then will talk about practical approaches to make Database Governance work today – to enhance the level of protection of your valuable information assets.


Speakers

Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...


Gold Sponsor

Oracle Identity Management's best-in-class suite of IdM solutions delivers the industry's only hot-pluggable middleware, allowing enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. With Oracle Identity Management, you enjoy:

 

Comprehensive, best-in-class solution—An integrated offering of highly acclaimed and innovative products, Oracle Identity Management offers the highest return on your investments with improved security, lower administrative costs, high scalability, and the backing of an industry leader.
Security for heterogeneous environments—"Hot-Pluggable" Oracle solutions interoperate with all major systems to ensure enterprise-wide security for all your applications.
Sustainable compliance—Innovative features fully integrated with your identity management infrastructure automate key processes to reduce audit cycles and dramatically lower costs.
In addition, Oracle Identity management is leading the next wave of Identity Management with an Application-Centric approach.

Watch now

Downloads

Webinar presentation, Martin Kuppinger

Webinar presentation, Oracle

Webcast download

Popular Webcasts

Next Webinar

Webinar

You Thought Shadow IT Was Bad? Meet Your Company’s Shadow Administrators

Despite being over 20 years old, Secure Shell (SSH) is still one of the most commonly used methods for both network encryption and secure user authentication. Nearly every server from distributed platforms to mainframes and the majority of network devices include an SSH server as a standard component. Many workstations come equipped with an SSH client, making it one of the most widely available tools for IT professionals. In every organization, SSH is used daily to access remote systems, run automated processes or transfer data over the network.

Next Conference

Congress

Digital Finance World 2017

Digital Finance World (DFW) on March 01-03, 2017 in Frankfurt, the only city with 2 Central Banks. Interact with a targeted and engaged audience, enjoy an unparalleled content depth, get guidance for critical decisions on the digital transformation of your enterprise.

Next Seminar

Leadership Seminar

Identity and Access Management Crash Course

Identity & Access Management (IAM) is one of the core disciplines in IT and as such it is getting more and more important. Reaching far beyond its traditional scope of managing employee's access to information stored inside the perimeter, IAM nowadays has to integrate cloud access on the one side, and has to include the customer on the other side, instead of just managing employee access.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00