A b s t r a c t 


 
Presenter: Robert Lockard
Organization: oraclewizard
Biographical Sketch: Robert Lockard is a professional Oracle DBA, designer, developer, and project manager. For the past 20 years, he has worked as an independent consultant providing quality services to customers at a reasonable price. He has worked in financial intelligence tracking money laundering, terrorist money, and identity theft. He also has worked in the cyber crimes arena tracking attacks on information systems. Robert specializes in evaluating and securing your Oracle database environment from threats both external and internal.

In 1987, Robert's boss called him into his office and told him that he was now their Oracle Wizard, then handed him a stack of Oracle tapes and told him to load it on the VAX. Since then, Robert has worked exclusively as an Oracle Database designer, developer, database administrator, and project manager.

Robert enjoys flying vintage aircraft, racing sailboats, photography, and technical diving. He owns and flies the Spirit of Baltimore Hon, a restored 1948 Ryan Navion, and lives in Glen Burnie, Maryland, on Marley Creek.
 
Title: Holistic Approach to Database Security
 
Abstract: This session features a discussion on defining the attack surface and what attack vectors are relevant to each node on the attack surface. Learn the concept of exploiting different nodes on the system, how attack vectors change for nodes, and mitigation changes for nodes. Discover the trusted path concept and how to apply mitigation to points along the trusted path to protect data. This session presents four things the DBA and developer can do now to secure the database environment. It also takes a piece of PL/SQL that is subject to SQL injection and moves through securing the code using Oracle Database 12c features and separating the data from the application code.
 
Topic: Database Development
Target Audience: All
Location: Amphitheater
 
 
Title: Holistic Approach to Database Security
 
Abstract: This session features a discussion on defining the attack surface and what attack vectors are relevant to each node on the attack surface. Learn the concept of exploiting different nodes on the system, how attack vectors change for nodes, and mitigation changes for nodes. Discover the trusted path concept and how to apply mitigation to points along the trusted path to protect data. This session presents four things the DBA and developer can do now to secure the database environment. It also takes a piece of PL/SQL that is subject to SQL injection and moves through securing the code using Oracle Database 12c features and separating the data from the application code.
 
Topic: Database Development
Target Audience: All
 
 
 


GaOUG Tech Days
May 9-10, 2017
www.gaoug.org/

Conference Administration Tool | Copyright © 2017, Prairie Systems Group, Limited
Page: DISPLAY_PRESENTER_ABSTRACT | Version 1.81