The referenced link to http://stackoverflow.com/questions/72394 is a good start. However, you will need to go further.
Specifically, encrypt ALL data at all levels. In transit via ssl (I'd say a 4KB key length minimum). At rest via encrypted file system AND encrypted database. For example MS SQL Server allows you to encrypt the entire database, not just passwords.
Do NOT use inline sql, stick with stored procedures. I don't care if you are properly escaping things. Inline sql means that you have a password in the open somewhere (generally in a config file) which allows the application to execute pretty much any sql call it wants. In the event your web app is cracked, they will have full access.
By limiting your web site to only execute stored proc's will increase difficulty in doing mass select's/delete's/whatever. Further, you can enforce your security model in side the s'procs themselves by first checking credentials passed in as parameters before executing anything. This let's the database protect itself and implies that you don't even trust your own webserver.
Ensure your server is physically protected. I've seen boxes go dark and when someone checked they found a blank spot where the server was. Secure access with video monitoring will help.
Also, log EVERYTHING. Who accessed what, what ip was used on login attempts, etc. It's nice when a client calls and asks "what happened to record X?" and I say "according to the log Bill Smith deleted it on April 3 from his house."
Next, research intrusion detection systems. These monitor the traffic coming in, parse it for the type of traffic, and can generally alert you when funny things are going on like failed login attempts to the sql server.
Test for replay attacks, also known as session hijacking. Put a token in the cookie value that gets confirmed on each post. Once confirmed, change the token to a non-guessable value. Repeat until user logs off. Whenever you see mismatched tokens, have the app scream loudly.
Make sure server to server communication is also encrypted. If on windows, this means setting good domain policies that enforce kerberos encryption on the line. I've been at several places where I brought up cain and able and could easily sniff everything from database and email passwords to actual sql transactions and responses going over the wire. Along these lines, make sure any routers involved are properly configured. As a side note, showing a CEO his email password 15 minutes into an audit is one way to prove a security audit was needed.
Finally, when you're done and ready to deploy hire an outside and reputable company (like IBM) to do a full security audit including PEN (penetration) testing. I don't now, nor have ever worked for IBM. However, I've seen some of the reports they've compiled. They are thorough.