According to the Identity Theft Resource Center, in the past year and a half, there have been close to 900 breaches and over 28,000,000 records compromised. With groups like Anonymous and LulzSec continuously hacking into major corporations and government agencies, do you wonder if you’re next?
No organization, industry, or government agency is immune to the proliferation of complex attacks and malicious behavior. Ensuring database security is a priority for organizations interested in protecting sensitive data and passing audits.
Over the course of this presentation, a description of some of the sophisticated methods used in invading enterprise databases will be discussed, and the evolution of the security issues and features in each will be provided. A demonstration of popular attacks will also be presented.
The presentation will conclude by proposing essential steps IT managers can take to securely configure, maintain databases, and defend against malicious breaches entirely. Attendees will leave with a basic understanding of the most effective methods for protecting their data, an enterprise’s most prized asset, from attackers today and in the future.
- • Understand the common vulnerabilities and misconfigurations used to attack databases
- • Methodologies and best practices on how to implement actionable plans
- manage database risks across large, heterogeneous database environments
About Josh Shaul

Josh Shaul
Chief Technology Officer
As the Chief Technology Officer with Application Security, Inc. (AppSec), Josh Shaul is responsible for the overall direction of the organization’s technical strategy, which includes responsibility for the product portfolio — AppDetectivePro for auditors and IT advisors, and its flagship solution, DbProtect for the enterprise.
During his tenure at AppSec, Josh has held positions in product management, engineering, sales and technical strategy.
Prior to AppSec, Josh was Director, Worldwide Systems Engineering with SafeNet, Inc. working on the industry’s first complete IPsec accelerator chip. In his five years with SafeNet, he was responsible for the design, development and enhancement of SafeNet’s embedded security solutions, covering a wide range of applications.
Josh is the foremost security policy and standards guru at the firm, with additional expertise in U.S. and Canadian Federal governments (both military and civilian), trusted computi