Meeting Information for April 2005

The next meeting of the LAADB2UG will be on Thursday, April 7, 2005. The meeting will be held at the IBM facilities in Costa Mesa, Room 221.

Driving Directions:  The IBM Facility is located at 600 Anton Boulevard in Costa Mesa, CA 92626. The telephone number there is (714) 438-6200. Please be advised that there is a parking fee if you use the garage. You may park across the street at the mall and walk across the overpass to save the parking fee.  Click here for directions and a map.

Meeting Schedule

8:30 - Doors open for coffee and refreshments.
9:00 - IBM comments and announcements
9:15 Ulf T. Mattson on A Practical Solution that Facilitates Database Compliance to Security Mandates and Industry Initiatives.
10:30 - Bio Break and Networking.
10:45 - Michael Scofield on Making Data Management Relevant and Safe in the Enterprise.


PRESENTER 1:
    Ulf T. Mattson - CTO Protegrity

Ulf T. Mattsson, Chief Technology Officer, Protegrity, holds a master's degree in physics and a number of patents in the IT security area. His extensive IT and security industry experience includes 20 years with IBM as a manager of software development and a consulting resource to IBM's Research and Development organization, in the areas of IT Architecture and IT Security. Mattsson is an IBM Certified IT Architect and a research member of the International Federation for Information Processing (IFIP) WG 11.3 Data and Application Security, and a member of WSEAS, Medical Records Institute, and the IBM Privacy Management Advisory Council.
 


PRESENTATION 1:  A Practical Solution that Facilitates Database Compliance to Security Mandates and Industry Initiatives

This session will discuss solutions for companies to comply with the strictest government and industry regulations on data privacy and security, providing financial institutions and healthcare companies compliance with the most stringent data security standards, including the Gramm-Leach-Bliley Act, (GLBA), the Health Insurance Portability and Accountability Act (HIPAA), the Visa Cardholder Information Security Program (CISP), the American Express Data Security Standard, the Sarbanes-Oxley Act, and the California Senate Bill No. 1386.

While laws and regulations interpret "protecting privacy" in a number of ways, any enterprise solution for protecting data - especially data at rest - must involve two things: secure encryption technology to protect confidential data and careful management of access to the cryptography keys that unlock the encrypted data.

This session will discuss designing information systems that protect the privacy and ownership of individual information while not impeding the flow of information. We present experience from many years of industrial use of cryptography in database security.

This session will discuss performance aspects, transparent storage and search of encrypted database fields, and the use the key concepts of security dictionary, type transparent cryptography and propose solutions on how to transparently store and search encrypted database
fields in DB2 databases.


PRESENTER 2:   Michael Scofield - Loma Linda University

Michael Scofield is a popular speaker and consultant in data quality and data management. He is an Assistant Professor in Health Information Management at Loma Linda University. He has held numerous posts in data architecture, data quality, and data management. His energetic delivery, laced with generous humor and vivid graphical examples, keep audiences engaged and learning.

His articles on data architecture and data quality techniques have been published in Information Week, IBI System Journal, Data Management Review, the Cutter IT Journal, and the Database Newsletter. His speaking engagements include DAMA-International conferences, Meta-data Conferences in London and the U.S., over 12 DAMA chapters, 4 Oracle User groups, DB2 user groups, and various CASE user group conferences. He also writes humor, published in the Los Angeles Times and other journals.


PRESENTATION 2:  Making Data Management Relevant and Safe in the Enterprise.

Data management, including the DBA functions, insofar as it is seen as a mere infrastructure function, can be at risk of being outsourced or offshored.

DBA's are often of a temperament which causes them to retreat into their cubicle and not engage with the rest of the organization, particularly the executive suite.

To ensure their survival, DBAs and others involved in data management must have their antennae up detecting needs for data, information, and information delivery which they can meet. They must be proactive in making their role beneficial to all their constituencies. We will discuss some of those roles, and issues.

BACK TO THE HOME PAGE

 

 

     Find out more about UDB Benchmarks here.


Website created and maintained by DataDoneRight.Com 
Copyright 2005. All rights reserved.