SQLBits encompasses everything from in-depth technical immersions to the enhancement of valuable soft skills. The full agenda will be announced in the spring; in the meantime check out the timetable and content we cover below.
2024 Training Days
Presenting 2024’s selection of training days, encompassing a deep dive into a range of subjects with some of the best data trainers in the world.
- 08:00 Registration opens and breakfast served.
- All training days run simultaneously across the venue from 09:00 – 17:00 with co-ordinated breaks.
- All training days include regular refreshment breaks and a lunch stop to rest, recharge, and chat to fellow delegates.
- No evening events planned, but if you’re staying over the night beforehand, why not join us in the Aviator on Monday night to meet the training day speakers for an informal drinks reception.
Secure Business Intelligence from the Inside Out
Description
How well do your BI development practices protect your data? The job of protecting data is not limited to the DBA. The Microsoft BI stack contains multiple tools which each have different security configuration options and interdependencies. In this workshop, you see specifically how data can be compromised in this stack, learn where the potential risks of a data breach are lurking in your BI solutions, and leave with specific steps you can take to mitigate those risks.
This workshop starts with an overview of security principles. Throughout the day, we explore the anatomy of an attack on your data component by component. We review the security architecture of each component in the BI stack and highlight vulnerabilities in the architecture that must be addressed to properly secure your BI environment. We explore security by using a multi-tier, multi-layered approach,
leaving no stone unturned.
By the end of this workshop, you'll understand the relationship across the security settings not only in the BI tools, but also the backend databases and the Windows operating system. As we examine potential security issues, we show you how to build a security action plan for Integration Services, Analysis Services, and Reporting Services. Is Azure in your environment? We also cover important aspects of cloud security for a BI solution. Come learn how to preserve and protect your data effectively from the inside out.
This workshop starts with an overview of security principles. Throughout the day, we explore the anatomy of an attack on your data component by component. We review the security architecture of each component in the BI stack and highlight vulnerabilities in the architecture that must be addressed to properly secure your BI environment. We explore security by using a multi-tier, multi-layered approach,
leaving no stone unturned.
By the end of this workshop, you'll understand the relationship across the security settings not only in the BI tools, but also the backend databases and the Windows operating system. As we examine potential security issues, we show you how to build a security action plan for Integration Services, Analysis Services, and Reporting Services. Is Azure in your environment? We also cover important aspects of cloud security for a BI solution. Come learn how to preserve and protect your data effectively from the inside out.
Learning Objectives
Previous Experience
Tech Covered
Azure, SSRS, DBA, BI, security