Secure Business Intelligence from the Inside Out
2017TL; DR
How well do your BI development practices protect your data? In this workshop, you learn where the potential risks of a data breach are lurking in your BI solutions and the steps you can take to mitigate those risks.
Session Details
How well do your BI development practices protect your data? The job of protecting data is not limited to the DBA. The Microsoft BI stack contains multiple tools which each have different security configuration options and interdependencies. In this workshop, you see specifically how data can be compromised in this stack, learn where the potential risks of a data breach are lurking in your BI solutions, and leave with specific steps you can take to mitigate those risks.
This workshop starts with an overview of security principles. Throughout the day, we explore the anatomy of an attack on your data component by component. We review the security architecture of each component in the BI stack and highlight vulnerabilities in the architecture that must be addressed to properly secure your BI environment. We explore security by using a multi-tier, multi-layered approach,
leaving no stone unturned.
By the end of this workshop, you'll understand the relationship across the security settings not only in the BI tools, but also the backend databases and the Windows operating system. As we examine potential security issues, we show you how to build a security action plan for Integration Services, Analysis Services, and Reporting Services. Is Azure in your environment? We also cover important aspects of cloud security for a BI solution. Come learn how to preserve and protect your data effectively from the inside out.
This workshop starts with an overview of security principles. Throughout the day, we explore the anatomy of an attack on your data component by component. We review the security architecture of each component in the BI stack and highlight vulnerabilities in the architecture that must be addressed to properly secure your BI environment. We explore security by using a multi-tier, multi-layered approach,
leaving no stone unturned.
By the end of this workshop, you'll understand the relationship across the security settings not only in the BI tools, but also the backend databases and the Windows operating system. As we examine potential security issues, we show you how to build a security action plan for Integration Services, Analysis Services, and Reporting Services. Is Azure in your environment? We also cover important aspects of cloud security for a BI solution. Come learn how to preserve and protect your data effectively from the inside out.
3 things you'll get out of this session
Speakers
Stacia Varga's previous sessions
Getting Your Story Straight with Data Visualizations
Choosing the wrong visualization can obscure the story - or worse yet, distort it! In this session, learn the vocabulary of data visualization and how to apply grammar (visualization design principles) to your data.
Building a BI Performance Monitoring Solution
Learn how to use performance counters, report execution log data, and trace files to troubleshoot performance problems. Learn how to set up a monitoring solution to capture data and diagnose slow queries.
So How Does BI Workload Impact the Database Engine? Part I
In this first of two sessions, we review the architecture of SQL Server and its BI components and deployment options for optimal performance. We'll also discuss how to optimize data warehouse load operations.