Using Database Tools to Meet Information Security Requirements

By: Michael Findling

Abstract: This session covers tagging of data assets per regulatory requirements (for example: FISMA, HIPAA, etc.) and shows how DSAuditor reports on who accessed the data.

Server Response from: ETNASC03