Geek Sync Webcast : Database Security Risks You Haven’t Considered, But Need To

Presenter: Kevin Beaver

Database security is arguably the most important part of an information security program that many people aren’t paying attention to. Some might assume that network or server security controls are adequate to protect databases. They’re not. Furthermore, gaps in IT governance processes often lead to security policies that aren’t enforced which can directly impact database systems. This is not only creating tangible business risks but it’s also creating numerous compliance gaps.

Join IDERA and Kevin Beaver as he walks through how you can be more proactive with database security. He’ll share specific database security oversights he’s finding in his work along with some tips on how to better integrate databases into your overall information risk management initiatives.

About Kevin

Kevin Beaver is an independent information security consultant, writer, professional speaker, and expert witness with Atlanta-based Principle Logic, LLC. With over 29 years of experience in the industry, Kevin specializes in performing independent security assessments and consulting to help his clients uncheck the boxes that keep creating a false sense of security. He has authored/co-authored 12 books on information security including the best-selling Hacking For Dummies and The Practical Guide to HIPAA Privacy and Security Compliance. In addition, he’s the creator of the Security On Wheels information security audio books and blog providing security learning for IT professionals on the go. Kevin can be reached at through his website at www.principlelogic.com and you can follow him on Twitter at @kevinbeaver.

Topics : Database Security,

Products : SQL Secure,

Register for Free Webcast

Note: By filling and submitting this form you understand and agree that the use of IDERA’s website is subject to the General Website Terms of Use. Additional details regarding IDERA’s collection and use of your personal information, including information about access, retention, rectification, deletion, security, cross-border transfers and other topics, is available in the Privacy Policy.