This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

Los Angeles/2011 Meetings

Revision as of 03:03, 31 May 2011 by Sarah Baso (talk | contribs) (moved 2011 Meetings to Los Angeles/2011 Meetings: Organizational clarity)

Jump to: navigation, search

Topic: NoSQL Security

Speaker: Bryan Sullivan 


Bryan Sullivan is a Senior Security Researcher with Adobe Systems, where he focuses on cloud security issues. Prior to Adobe, he was a program manager on Microsoft's Security Development Lifecycle team, and a development manager at HP, where he helped to design HP's vulnerability scanning tools WebInspect and DevInspect.

Bryan has spoken at security industry conferences such as Black Hat, RSA Conference, BlueHat and TechEd on topics such as RIA architecture, REST, cryptography, denial-of-service defense, URL rewriting, and applying secure development processes to Agile projects. He was the author of the MSDN Magazine column Security Briefs, and is the coauthor of the books Ajax Security (Addison-Wesley, 2007) and the upcoming Secure Web Applications, A Beginner's Guide (McGraw-Hill, 2011).

Abstract: NoSQL Security

NoSQL databases are rapidly gaining popularity, especially for use in distributed, high-availability cloud services. But are we making the same mistakes with NoSQL in the childhood of the cloud that we made with SQL in the childhood of the web? This talk will examine some general security issues that come with emphasizing the Availability aspect of Consistency/Availability/Partition-tolerance, and we'll also look at some specific issues with popular NoSQL databases such as MongoDB and Cassandra.


Business Partner Solutions

BPS has experience with fortune 500, City, and State Government clients. BPS has working technical knowledge in the following areas of security and compliance:

Audit trail monitoring and planning
Business continuity planning and disaster recovery
Configuration management
Data classification
Incident response planning
Policy development
Risk analysis and acceptance
Forensic tools and methodology
Secure software development lifecycle (SDLC)
Vulnerability management and remediation
Project management