AppSecInc to Host DB Auditing Webinar

Application Security Inc. hosts database auditing best practices Web seminar

NEW YORK -- With increased regulatory requirements for data protection, and the frequency of enterprise data attacks on the rise, Application Security, Inc. is offering a best-practices web seminar to address the critical role of real-time activity monitoring and auditing in protecting an organization’s database assets.

According to estimates by Forrester Research, 70 percent of all database breaches are internal.* As such, monitoring that data for unusual or suspicious activity to mitigate the potential risks of compromised data is now more essential for meeting stringent compliance requirements like SOX, FISMA, PCI, HIPAA and GLBA.

The fifth in Application Security, Inc.’s educational series, the webcast will address:

  • The five components of database activity monitoring and auditing: access and authentication auditing, user and administrator auditing, security activity monitoring, vulnerability and threat monitoring, and change auditing

  • How to develop tamper-evident monitoring systems and audit trails
  • Examples of database attacks and how they could have been prevented using activity monitoring

Monitoring and security auditing are critical components to achieving a strong defense-in-depth strategy around organizations’ sensitive database applications. Database intrusion detection and privileged user/activity monitoring continues to grow in importance because of the rising volume of database breaches. Aaron Newman, CTO and co-founder of Application Security, Inc. and co-author of the Oracle Security Handbook will lead a detailed discussion targeted at any professional tasked with securing, monitoring, or auditing database assets.

PRESENTER: Aaron Newman, CTO and Co-founder, Application Security, Inc.

TITLE: “Database Auditing Best Practices”

WHEN: Thursday, August 23, 2:00 p.m. - 3:00 p.m. EDT/11:00 a.m. – 12:00 p.m. PDT

*Source: “Enterprise Databases Need Greater Focus to Meet Regulatory Compliance Requirements,” by Noel Yuhanna, January 24, 2007.

Application Security Inc.