CorreLog, Inc. Announces Sponsorship, Technical Breakout Session at 2017 IDUG DB2 North American Tech Conference, April 30-May 4

Share Article

CorreLog has secured a sponsorship at the 2017 IDUG North American Tech Conference in Anaheim, California, and will host a breakout session in which Charles Mills, CorreLog Director of Advanced Projects, will provide participants with a deeper understanding of how to leverage modern DB2 auditing for real-time security alerts.

The threat landscape is much different today due to increased global connectivity and the ways organizations use DB2, so they must pay close attention to attempts to access to these systems.

CorreLog, the leader in multi-platform IT security event log management, today announced sponsorship and a technical breakout session at the 2017 IDUG DB2 North American Tech Conference, April 30-May 4. The conference will be held at the Disneyland Hotel in Anaheim, California, and is an opportunity for IBM® DB2® professionals to increase their understanding of emerging data technologies such as Big Data and analytics, machine learning, performance enterprise architectures, and more.

This year, CorreLog will again host a guest appearance from DB2 expert and architect Craig S. Mullins in booth #107 Tuesday, May 2, from noon-1 p.m. and 5-6 p.m., local time. Attendees who stop by can purchase Mullins’ acclaimed book “DB2 Developer’s Guide” and register for a chance to win a signed copy.

“DB2 continues to be the database of choice in terms of performance and availability for the world’s largest enterprises,” said George Faucher, CorreLog president and CEO. “The threat landscape is much different today due to increased global connectivity and the ways organizations use DB2, so they must pay close attention to attempts to access to these systems. We’ve designed our latest release of dbDefender™ to extend the modern benefits of the SIEM (Security Information and Event Management) systems most organizations already have in place to include real-time visibility into who does what in these datasets.”

The majority of Fortune 500 companies, including most of the world’s top insurance providers, retailers, and banks, depend on IBM® DB2® to store their data, according to IBM’s website. In response to cyber-threats continuing to gravitate towards the most valuable data, CorreLog recently unveiled a new release of dbDefender™ for DB2 – its real-time Database Activity Monitoring (DAM) solution for IBM® DB2®. dbDefender™ will be on display at this year’s IDUG conference, and interested attendees can find CorreLog in booth #107 hosting solution demos throughout exhibition hours.

CorreLog IDUG Speaking Session:

Charles Mills, CorreLog’s Director of Advanced Projects, will host a technical breakout session for attendees seeking a deeper understanding of modern Database Activity Monitoring or DAM, including real-time auditing techniques to detect database breaches originating from both privileged users inside and external sources.

Title: “The Cyber Threat Landscape has Changed – You Must Change, too”

  •     When: Thursday May 4, 2017 | 10:30 – 11:30 a.m. local time
  •     Room: North Ballroom – z/OS II Sessions | The Disneyland Hotel in Anaheim, CA
  •     Session #: 4241 | Session Details from
  •     Speaker: Charles Mills, CorreLog Director of Advanced Projects | Speaker Bio
  •     Speaking Track: DB2 for z/OS – II

Session Abstract:

The security landscape has changed. Mainframes used to be largely invisible to the hackers – and to many IT auditors! Many hacks were basically mischief-motivated. DB2 access controls kept out any employees who tried to browse DB2 data they were not authorized to see. Nightly audit reports were state of the art.

Things have changed! Mainframes are definitely on the hackers’ radar – and they are after your PCI DSS, HIPAA, FISMA, GLBA, and other financial and personal data. It has gotten hard to hide the mainframe from the IT auditors. A large percentage of data breaches now involve insiders or outsiders with stolen insider credentials – breaches against which authentication and authorization are not effective. Disclosure laws require you to report breaches promptly, but 62 percent of breaches take months, and 4 percent take years before they are discovered. Come to this session and hear about the changes in the security threat landscape, why PCI DSS, HIPAA, GDPR and other regulatory standards require proof of an audit trail, what kinds of DB2 events you can and should audit, and how to audit them in real time with alerts, not reports and that no one ever looks at.

“IDUG is an essential event for keeping DB2 architects and engineers on the leading edge of modern management and security techniques, and we’re excited to sponsor and host a breakout session again this year,” added Faucher.

About IDUG:

The International DB2 Users Group (IDUG®) is an independent, not-for-profit, user-run organization whose mission is to support and strengthen the information services community by providing the highest quality education and services designed to promote the effective utilization of DB2. For more information, visit

About CorreLog:

CorreLog, Inc., a privately held corporation, is an independent software vendor (ISV) that has produced software and framework components used successfully by hundreds of private and government organizations worldwide. Our core solutions provide visibility across both mainframe and distributed systems on user activity that is indicative of cyber threat. Since 2008, CorreLog, Inc. has been committed to delivering better decision-support solutions for InfoSec and security auditing professionals who need more advanced perimeter security and improved adherence to PCI DSS, HIPAA, SOX, IRS Pub. 1075, FISMA, GDPR, NERC and other industry standards for securing data. Our solutions are designed to be highly interoperable and complementary to clients’ existing IT investments.

CorreLog zDefender™ holds certified integrations with IBM, HP, Intel (McAfee) Security, Micro Focus, (EMC) RSA Security Analytics, and field integrations with all other brand-name SIEMs. We consider our technology approach to be unique in both personnel and product and we believe our solutions pass the test of low total cost of ownership with high SIEM functionality.  For more information on CorreLog products, please visit


Copyright © 2017, CorreLog, Inc. All rights reserved.
All trademarks and registered trademarks used herein are the properties of their respective owners.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Tony Perri
CorreLog, Inc.
+1 (877) 267-7356 Ext: 422
Email >
Follow >
CorreLog, Inc.
Like >
CorreLog, Inc.

Follow us on
Visit website