SQL Clone
SQLServerCentral is supported by Redgate
Log in  ::  Register  ::  Not logged in

Speaking Twice on Oct 1, 2013

Carolina Technology Conference:

To start things off, I'll be speaking in the morning at the Carolina Technology Conference. I have a 40 minute slot from 10:05 - 10:45 AM Eastern. I'm shooting for a 30-35 minute presentation with 5-10 minutes of questions. Here's the information on the talk:


Building a Secure Infrastructure for Database Servers

In warfare, understanding your enemy is a supreme advantage. The same is true when it comes to protecting a modern database platform. We’ll get into the mindset of an attacker, looking at the methods and techniques attackers use to go after SQL Server. Once we understanding the threats, we’ll then examine defensive techniques to secure and protect your data (and not just your servers), using both new and creative methods, as well as the tried and true.
For instance, end databases are only one part of the overall Extract, Transform, Load (ETL) pipeline for most organizations. As recent, successful attacks have shown, attackers are now looking at other areas to steal your data. I will walk you through common scenarios and examine the various points an attacker may target, how those points can be attacked, and what you can do to secure them. We’ll look at the whole implementation, from the source system which originates the data all the way through to the database backups.


PASS DBA Fundamentals Virtual Chapter:

During the lunch period here on the East Coast of the USA I'll be giving a webinar for the DBA Fundamentals virtual chapter. That will be at 12 noon Eastern, 11 AM Central. This will be via LiveMeeting. Here's the information on the talk:


What You Absolutely Must Know about SQL Server Security

Data security breaches are in the news regularly. In many cases, these breaches are due to poor or incomplete security configurations. In this session we'll look at the basic Microsoft SQL Server security model and what you need to look at for your own system. We'll cover the top things to check both inside and outside of SQL Server to lock down your databases while still providing the access your users need. Finally, we'll also talk about how what you should be auditing regularly to ensure your SQL Server stays secured.



K. Brian Kelley - Databases, Infrastructure, and Security

IT Security, MySQL, Perl, SQL Server, and Windows technologies.


No comments.

Leave a Comment

Please register or log in to leave a comment.