Actions and Detail Panel
Ed Leighton-Dick: Securing the Data Platform: Crafting a Strategy That Work...
Fri, April 7, 2017, 8:00 AM – 5:00 PM CDT
Presenter: Ed Leighton-Dick - http://www.edleightondick.com
Ed Leighton-Dick is a Microsoft MVP, SQL Server performance and architecture specialist, and Founder/Principal Consultant of Kingfisher Technologies. He is a frequent volunteer with PASS, including roles as regional mentor, chapter leader of I-380 PASS SQL Server User Group, and organizer of SQLSaturday Iowa City. He can often be found teaching sessions at local, regional, and national events, including user groups, SQLSaturday, and PASS Summit.
Your database servers are insecure, and you know it. Unfortunately, so does the person upstairs who just wants to take a peek. That executive who wants a copy of the database to build some reports on the plane knows it. So does the call center rep who’s trying to provide great service to the customer on the phone. And the hacker who’s attacking your website? Yeah, they know it, too. We can no longer rely solely on the same old security practices to protect our data. We need to secure the data at its source.
In this full-day course, Microsoft MVP Ed Leighton-Dick will lead participants in a tour of security for the Microsoft data platform, particularly SQL Server. The complex security needs of SQL Server itself will be presented as a series of layers to give participants a framework for planning and implementation after the completion of the course. A significant portion of this discussion will focus on ensuring that all participants, regardless of past experience, gain a common, thorough understanding of the critical authentication and authorization structures of the data platform. Security of other pieces of the Microsoft data platform will also be covered. By the end of the day, participants will gain familiarity with tools and techniques they can use to protect their systems from common threats.
Topics to be addressed in this course include the following:
- Authentication and authorization structures
- Separation of duties
- Securing server-to-server communications
- Cloud security
- Common threats
- Monitoring and Auditing the security infrastructure
- New security features included in SQL Server 2016
Upon completion of this course, attendees will understand:
- Current threats to their SQL Server environment
- How to implement SQL Server's built-in security features to defend against threats
- How to monitor the security framework they have implemented
1-3 years of experience administrering SQL Server datases in some capacity
A copy of slides and demonstrations will be provided to attendees for reference and experimentation in their environments.
Laptops are not required for this course.