This resource is no longer available

Making Effective Use of Database Monitoring/Auditing Tools for Security and Compliance

Cover
Spurred by mandates such as PCI and a daily stream of headline-grabbing data breaches, enterprises are scrambling to shore up database access controls and determine where all their critical data resides. This webcast helps you understand how automated data monitoring and auditing tools help meet compliance and security requirements and what you should look for to determine which tools work best for your environment.

Attend this webcast and discover:

  • Specific security and access control requirements for regulatory and internal auditing
  • Easy to follow steps to determine and demonstrate the ROI potential of automated monitoring and auditing tools
  • How these tools work and key differentiators to look for

Speaker

James C. Foster Software Security Consultant James C. Foster is deputy director for Global Security Solution Development at CSC. He has also worked for Guardent (acquired by Verisign), Foundstone (acquired by McAfee) and the Department of Defense. Foster is also a technical editor for Information Security.
Vendor:
Scentric Inc.
Premiered:
Oct 12, 2006, 12:00 EDT (16:00 GMT)
Format:
Multimedia
Type:
Webcast
Language:
English

This resource is no longer available.