This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Los Angeles/2011 Meetings"

From OWASP
Jump to: navigation, search
m (moved 2011 Meetings to Los Angeles/2011 Meetings: Organizational clarity)
(No difference)

Revision as of 03:03, 31 May 2011

Topic: NoSQL Security

Speaker: Bryan Sullivan 

BryanSullivan.JPG

Bryan Sullivan is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect.

Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on topics such as RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011).

Abstract: NoSQL Security

NoSQL databases are rapidly gaining popularity, especially for use in distributed, high-availability cloud services. But are we making the same mistakes with NoSQL in the childhood of the cloud that we made with SQL in the childhood of the web? This talk will examine some general security issues that come with emphasizing the Availability aspect of Consistency/Availability/Partition-tolerance, and we'll also look at some specific issues with popular NoSQL databases such as MongoDB and Cassandra.

Sponsors:

Business Partner Solutions


BPS has experience with fortune 500, City, and State Government clients. BPS has working technical knowledge in the following areas of security and compliance:

Audit trail monitoring and planning
Business continuity planning and disaster recovery
Configuration management
Data classification
Incident response planning
Policy development
Risk analysis and acceptance
Forensics
Forensic tools and methodology
Secure software development lifecycle (SDLC)
Vulnerability management and remediation
Project management