Data Security on an Ever-Changing Data Platform


Details
The August Ohio North Database Training user group meeting will be held on September 9th, 2025 at 5:00PM. This will be a HYBRID event with Ed Pollack joining us online.
You're welcome to come meet in-person at our meeting location, the offices of Improving at
6000 Freedom Square Dr,
Unit 110,
Independence, OH 44131
Teams Link if anyone needs it after RSVP-ing for in person.
If you would like to subscribe to our email list outside of Meetup, we have changed platforms recently and you will need to register here in Kit instead to receive emails.
Agenda:
5:00 PM EST: Online and in-person meeting begins with a social hour. This is an unstructured hour where you can join us to catch up and meet other group members before the session starts. There will be food brought in for in-person attendees.
6:00 PM EST: Updates and announcements, followed by our feature presentation. See below for presentation details.
7:30 PM EST: Optionally after the main presentations, the in-person crowd may go out for snacks and drinks at a local establishment.
We hope to see you there!
Session Abstract
Organizations are creating and managing more data than ever. As stewards of this data, we are tasked with ensuring that it is highly available, secure from threats, and only accessible to those that it is intended for.
This session dives into the many areas that keep security officers awake at night, including:
• Principle of least privilege
• Data governance
• Data compliance laws and regulations
• Common exploits
• Security best practices for developers
• Encryption
• Industry-specific security guidelines
As data platforms grow and evolve, the benefit of centralizing and standardizing security solutions is greater than ever. The frequency of data breaches has increased over time, and despite continuing to improve our security posture, the complexity and effectiveness of attacks continues to keep pace.
Data security is a key implementation of risk management. All organizations are targeted by cyber threat actors. Success is dissuading those malicious parties from persisting in their attacks. Knowing how to effectively layer security and create effective access methods between users and data will provide the highest chances of success given an ever-changing threat landscape.
*Please note, that we will be using Microsoft Teams for the online portion of this meeting. You may want to join a few minutes early to ensure you do not have any issues. If you are attending in person, there are large TVs at the office, and you do not need to bring a laptop or use Teams.

Sponsors
Data Security on an Ever-Changing Data Platform