Trust is Weakness – The End to End Security Story
In this birds-of-a-feather session, we will discuss with you the whole end to end security story including Identity Management and Database Security. The integrity of an Application is vulnerable to assaults from both casual and malicious; internal or external sources. These assaults can be done at various levels (eg. at Application Level or at Database Level). Therefore it is important to discuss the whole end to end security story around Database Security and Identity Management.