When protecting your most critical personal assets, you take a defense-in-depth approach. Beyond the lock on your door, you have a video doorbell, perimeter security sensors, active security monitoring, locks on your windows, a fire-proof safe for your most valuable assets, and more. This same approach is often overlooked when protecting sensitive data in your databases.
| How to implement a proven database security approach to understand and remediate against database risk |
| How to implement a least-privilege approach to limit who has access and to what data in your databases |
| Why security technology that is not purpose-built for databases are not enough to protect against breach and exfiltration |
| How attackers target database weaknesses for more than just stealing data |
| |
Darren Van Booven Former CISO, Idaho National Lab, Security Consultant, Trustwave Government Solutions | Travis Lee Director, Product Management, Trustwave Government Solutions |