Database Governance – How to Put the Right Controls in Place to Protect your Data
- LANGUAGE: English DATE: Tuesday, March 15, 2011 TIME: 3pm CET, 10am EST
Roxana Bradescu of Oracle then will talk about practical approaches to make Database Governance work today – to enhance your level of protection of the valuable information assets.
When looking at several of the incidents which became public during the last 2 years, many of them obviously are based on the fact that someone could access data in databases and bypassed other levels of protection like network security or application security. In addition, regulatory compliance and the auditors are increasingly looking at the protection of databases. The idea of data ownership has significantly gained momentum, to name one example. Thus it is time to introduce the concept of Database Governance and to put this into the context of your overall Corporate and IT Governance initiatives. Database Governance is a core element of Information Governance. It is about defining controls and policies to adequately protect information in databases and the flow of this information. Like any approach to governance, Database Governance is a mix of organization and supporting technology, to define controls and to make them effective.
In this webinar, Martin Kuppinger will, for the first time ever, introduce the concept of Database Governance, the reasons why you should do that and the connection to Governance initiatives as well as Database Security technologies. He will discuss the areas where new conceptual and technical approaches will be required.
Roxana Bradescu of Oracle then will talk about practical approaches to make Database Governance work today – to enhance the level of protection of your valuable information assets.
The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data are spread across multiple environments, on-premises and in the cloud. With more sensitive information getting out of our control every day, a data breach is just waiting to occur, and the consequences, if successful, can be disastrous for your business.
The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.