CISO Digital Transformation Summit | Nov. 17, 2020 CST | Virtual Summit - Real-time Online Conversations



You Need to Know Who Is Accessing Your Data, But Do You Really?

Thought Leadership - 1:20 pm - 1:40 pm

Knowing who is accessing what data is at the heart of security. Today, users and attackers get to your data through a mesh of web applications, APIs, and microservices. Unfortunately, your database logs only report the querying source as an authorized intermediary application without the originating requestor's information. This blind spot causes glaring gaps during audits, slows incident response, and impede breach detection. 

Learn how to apply new ways of continuously linking originating users' information to every database access with cohesive interworking between edge WAF, server RASP, and Data Activity Monitoring tools.

Presented by:

Jose Gomez, Sales Engineering Manager, Imperva View details


Sponsored by:

Imperva View details