Saturday, May 9, 2009

Best Practices for Data Privacy & Protection - Live Webcast
sponsored by Guardium

We invite you to attend an exclusive webcast to learn best practices for protecting Personally Identifiable Information (PII) and other sensitive data against new and emerging threats such as SQL injection and rogue insiders. Find out how global organisations have implemented granular access controls and real-time monitoring to track all access to sensitive data -- across all their DBMS platforms and applications -- without impacting performance or changing databases or applications.

WEBCAST: Best Practices for Data Privacy & Protection
DATE: Wednesday, 27 May 2009
TIME: 15:00 GMT / 10:00 am ET



According to IBM, SQL injection attacks jumped 134% in 2008, increasing from an average of a few thousand per day in 2007 to 450,000 attacks per day.

And a data breach study by Verizon Business Services revealed that database servers accounted for 75% of all records breached, while end-user devices such as laptops and USB drives accounted for only 0.01% of all records breached.

Protecting against cyber attacks, breaches, fraud and insider threats has heightened the need for organisations to carefully review their security programs for securing PII and other sensitive data against regulations and directives that they must comply with including:

  • EU e-privacy and personal data-protection rules,
  • UK Data Protection Act, or
  • US FISMA-mandated NIST 800-53 standard and OMB M-06-16 directive ("Protection of Sensitive Agency Information").

At the same time, organisations are looking to streamline their data security infrastructures with automated and centralised controls for complex, heterogeneous and distributed environments.

In this 1-hour session, attendees will learn proven ways to gain 100% visibility into all database activity including:

  • Why traditional "fortress approaches" -- such as firewalls and IDS/IPS systems -- are no longer sufficient to protect against 21st-century attackers who can easily bypass perimeter defenses
  • Identifying unauthorised or suspicious access with real-time, policy-based controls
  • Blocking privileged users from access to sensitive data without impacting application traffic
  • Identifying fraud at the application layer (connection pooling)
  • Enforcing change controls by integrating with change ticketing systems such as BMC Remedy
  • Replacing manual, log-based compliance processes with automated reporting, sign-offs & escalations
  • Leveraging the latest technologies for real-time database activity monitoring, vulnerability assessment, data discovery and configuration auditing.

To register, go to https://guardium.webex.com/guardium/onstage/g.php?t=a&d=480326017

No comments:

Post a Comment