Database Governance – How to Put the Right Controls in Place to Protect your Data

  • LANGUAGE: English DATE: Tuesday, March 15, 2011 TIME: 3pm CET, 10am EST
Upcoming Webinars
In this webinar, Martin Kuppinger will, for the first time ever, introduce the concept of Database Governance, the reasons why you should do that and the connection to Governance initiatives as well as Database Security technologies. He will as well talk about the areas where new conceptual and technical approaches will be required.
Roxana Bradescu of Oracle then will talk about practical approaches to make Database Governance work today – to enhance your level of protection of the valuable information assets.

When looking at several of the incidents which became public during the last 2 years, many of them obviously are based on the fact that someone could access data in databases and bypassed other levels of protection like network security or application security. In addition, regulatory compliance and the auditors are increasingly looking at the protection of databases. The idea of data ownership has significantly gained momentum, to name one example. Thus it is time to introduce the concept of Database Governance and to put this into the context of your overall Corporate and IT Governance initiatives. Database Governance is a core element of Information Governance. It is about defining controls and policies to adequately protect information in databases and the flow of this information. Like any approach to governance, Database Governance is a mix of organization and supporting technology, to define controls and to make them effective.

In this webinar, Martin Kuppinger will, for the first time ever, introduce the concept of Database Governance, the reasons why you should do that and the connection to Governance initiatives as well as Database Security technologies. He will discuss the areas where new conceptual and technical approaches will be required.

Roxana Bradescu of Oracle then will talk about practical approaches to make Database Governance work today – to enhance the level of protection of your valuable information assets.


Speakers


Gold Sponsor

Oracle Identity Management's best-in-class suite of IdM solutions delivers the industry's only hot-pluggable middleware, allowing enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. With Oracle Identity Management, you enjoy:
Comprehensive, best-in-class solution—An integrated offering of highly acclaimed and innovative products, Oracle Identity Management offers the highest return on your investments with improved security, lower administrative costs, high scalability, and the backing of an industry leader.
Security for heterogeneous environments—"Hot-Pluggable" Oracle solutions interoperate with all major systems to ensure enterprise-wide security for all your applications.
Sustainable compliance—Innovative features fully integrated with your identity management infrastructure automate key processes to reduce audit cycles and dramatically lower costs.
In addition, Oracle Identity management is leading the next wave of Identity Management with an Application-Centric approach.

Watch now

Downloads

Webinar presentation, Martin Kuppinger

Webinar presentation, Oracle

Webcast download

Popular Webcasts

Next Webinar

Webinar

Identity is Security: Avoiding the Pitfalls of an Authentication-Centric Security Architecture

The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data are spread across multiple environments, on-premises and in the cloud. With more sensitive information getting out of our control every day, a data breach is just waiting to occur, and the consequences, if successful, can be disastrous for your business.

Next Conference

Conference

Consumer Identity World USA 2018

The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00