Hi [[ session.user.profile.firstName ]]

Countering Adversaries Part 3: Hacktivists and SQL Injection Attacks

Activists break into organizational web applications and databases to find personal and organizational data in order to expose this private information. The Verizon Data Breach investigations report says “Hacktivists generally act out of ideological motivations, but sometimes just for the fun and ep
Activists break into organizational web applications and databases to find personal and organizational data in order to expose this private information. The Verizon Data Breach investigations report says “Hacktivists generally act out of ideological motivations, but sometimes just for the fun and epic lutz.” In this third webcast of a three part series, (ISC)2 and Oracle will examine their number one tool of choice: SQL injection attacks. SQL injection attacks are both simple to perform and difficult to detect. We’ll discuss detecting and blocking SQL injection attacks in order to protect your most sensitive customer and organizational data from “epic lutz”.​
Recorded May 22 2014
60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Roxana Bradescu, Director of Product Management, Database Security, Oracle & Brandon Dunlap, Brightfly
Presentation preview: Countering Adversaries Part 3: Hacktivists and SQL Injection Attacks
Recommended for you:
  • Date
  • Rating
  • Views

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Countering Adversaries Part 3: Hacktivists and SQL Injection Attacks
  • Live at: May 22 2014 5:00 pm
  • Presented by: Roxana Bradescu, Director of Product Management, Database Security, Oracle & Brandon Dunlap, Brightfly
  • From:
Your email has been sent.
or close
You must be logged in to email this