Hi {{ session.user.profile.firstName }}

Hacking Databases: Exploiting Top Database Vulnerabilities & Misconfigurations

Manage webcast
Josh Shaul, CTO, Application Security Inc.
According to the Identity Theft Resource Center, in the past year and a half, there have been close to 900 breaches and over 28,000,000 records compromised. With groups like Anonymous and LulzSec continuously hacking into major corporations and government agencies, do you wonder if you’re next?

No organization, industry, or government agency is immune to the proliferation of complex attacks and malicious behavior. Ensuring database security is a priority for organizations interested in protecting sensitive data and passing audits.

Over the course of this presentation, a description of some of the sophisticated methods used in invading enterprise databases will be discussed, and the evolution of the security issues and features in each will be provided. A demonstration of popular attacks will also be presented.

The presentation will conclude by proposing essential steps IT managers can take to securely configure, maintain databases, and defend against malicious breaches entirely. Attendees will leave with a basic understanding of the most effective methods for protecting their data, an enterprise’s most prized asset, from attackers today and in the future.
Aug 15 2012
45 mins
Hacking Databases: Exploiting Top Database Vulnerabilities & Misconfigurations
More from this community:

IT Governance, Risk and Compliance

  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Hacking Databases: Exploiting Top Database Vulnerabilities & Misconfigurations
  • Live at: Aug 15 2012 6:00 pm
  • Presented by: Josh Shaul, CTO, Application Security Inc.
  • From:
Your email has been sent.
or close
You must be logged in to email this