This resource is no longer available

Protecting your database against insider abuse


While splashy external threats like denials-of-service and Trojan-based botnets might get all of the attention, many of the more dangerous threats to enterprise security lie inside the corporate firewall. Employees, partners, customers, consultants and other trusted insiders need access to sensitive documents and data in order to do their jobs, but ensuring that they don't abuse that trust by stealing company records, overstepping their permissions or erasing vital records is a major headache. A recent survey of more than 700 security professionals found that more than 74% of respondents consider detecting and thwarting internal attacks to be a top priority for 2008. In this video, you will learn:

  • How to implement internal controls to monitor access to sensitive database records
  • Effective access-control policies
  • Defenses against common database configuration mistakes
Interested in this topic, but prefer alternative content formats? Try:


Rich Mogull Founder, Securosis, L.L.C. Rich Mogull has over 17 years experience in information security, physical security, and risk management. Prior to founding Securosis, Rich spent 7 years as one of the leading security analysts with Gartner, where he advised thousands of clients, authored dozens of reports and was consistently rated as one of Gartner's top international speakers. He is one of the world's premier authorities on data security technologies and has covered issues ranging from vulnerabilities and threats, to risk management frameworks, to major application security.
Guardium, an IBM Company
15 Apr 2008
Apr 15, 2008, 09:00 EDT (13:00 GMT)

This resource is no longer available.