The database is at the heart of your organisation's applications. If you can embed secure practices here, then it will flow throw the rest of your application stack. We'll look at how permissions can be used,  implementing per role filtering on returned data, and the where data masking can be used.
No more worrying if the web developer is properly screening fields , can the support analyst can see personal details than needed