Here is my text from the registration page:
Most companies use the checklist/tip based approach to secure their databases. However, this is a flawed approach. The checklists available for hardening are based around parameters and the core database software â€" not the data. The goal must be to secure the *data*, not the software; of course we must use the software setttings to secure the data, but the focus of any data security project must be the data.
Pete will show the issues with the traditional approach and then outline what is the correct approach to securing data with lots of examples and tips. Pete will work through the process needed step by step to target and understand your data, and then outline steps to secure it.
Presenter: Pete Finnigan
Pete is well known in the Oracle and security worlds for contributing to the field with books, papers and presentations. Pete wrote the SANS Oracle Security Step by Step (SANS) and created the S.C.O.R.E checklist, and the CIS Benchmark is based on his work. He recently wrote chapters on data security and user security for the new Oak Table book, "Oracle Expert Practices." Pete also consults for clients worldwide, securing their data through design work and security audits, and also teaching his very successful training courses.
If you would like to join the webinar, please go to the registration page.