This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Los Angeles/2011 Meetings/February 23"
Sarah Baso (talk | contribs) (Created page with "Speaker: Scott Sutherland Topic: Database Security in the Real World Meeting Sponsor: NetSpi More info forthcoming...") |
Sarah Baso (talk | contribs) |
||
Line 1: | Line 1: | ||
− | + | == '''Topic: When Databases Attack'''<br> == | |
− | Topic: | ||
− | |||
+ | == '''Speaker: Scott Sutherland'''[[Image:Scottsutherland.jpeg|left|112x168px|Scottsutherland.jpeg]] <br> == | ||
− | + | Scott Sutherland is a Senior Security Consultant responsible for the development and management of penetration test services at NetSPI, which is a security services company based in Minneapolis. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. Scott has ten years of IT consulting experience. Six of which have been focused on providing security services. Additionally, Scott presented at the National OWASP AppSec 2010 Conference and the local Security BSidesMSP conferences in the last year.<br> | |
+ | |||
+ | '''<span style="display: none" id="1298067122121S"> </span>''' | ||
+ | |||
+ | '''<span style="display: none" id="1298067115834S"> </span>''' | ||
+ | |||
+ | <br> | ||
+ | |||
+ | <br> | ||
+ | |||
+ | <br> | ||
+ | |||
+ | == '''<br><br>Abstract: Database Security in the Real World'''<br> == | ||
+ | |||
+ | This presentation will provide an overview of the common threats and vectors that are leveraged by real world attackers to gain unauthorized access to high value databases. It is well understood that high value databases support critical applications and store sensitive information, but they can also be used to escalate privileges in Windows environments and propagate botnets across the internet. This presentation will provide developers and system administrators with a better understanding of how those attacks are conducted.<br> | ||
+ | |||
+ | <br> | ||
+ | |||
+ | == '''Sponsor:''' == | ||
+ | |||
+ | [[Image:Netspi logo.png|left|Netspi logo.png]] | ||
+ | |||
+ | <br>'''<br>''' | ||
+ | |||
+ | <br> | ||
+ | |||
+ | <br> | ||
+ | |||
+ | |||
+ | |||
+ | [http://www.netspi.com/ http://www.netspi.com/] |
Revision as of 14:56, 31 May 2011
Topic: When Databases Attack
Speaker: Scott Sutherland
Scott Sutherland is a Senior Security Consultant responsible for the development and management of penetration test services at NetSPI, which is a security services company based in Minneapolis. His role includes researching and developing tools, techniques, and methodologies used during network and application penetration tests. Scott has ten years of IT consulting experience. Six of which have been focused on providing security services. Additionally, Scott presented at the National OWASP AppSec 2010 Conference and the local Security BSidesMSP conferences in the last year.
Abstract: Database Security in the Real World
This presentation will provide an overview of the common threats and vectors that are leveraged by real world attackers to gain unauthorized access to high value databases. It is well understood that high value databases support critical applications and store sensitive information, but they can also be used to escalate privileges in Windows environments and propagate botnets across the internet. This presentation will provide developers and system administrators with a better understanding of how those attacks are conducted.
Sponsor: