Session Date/Time (dd-MM-YYYY 24h) | Speaker | Category | Track | Title |
---|---|---|---|---|
03-05-2017 12:00 | Brian Kelley | 24 Hours of PASS (60 minutes) | Application & Database Development | What You Absolutely Must Know about SQL Server Security |
03-05-2017 13:00 | Grant Fritchey | 24 Hours of PASS (60 minutes) | Application & Database Development | Protecting Production Data in Non-Production Environments |
03-05-2017 14:00 | Reinaldo Kibel | 24 Hours of PASS (60 minutes) | Enterprise Database Administration & Deployment | Hackers Move Away, We are Always Encrypted |
03-05-2017 15:00 | Bob Pusateri | 24 Hours of PASS (60 minutes) | Enterprise Database Administration & Deployment | Passive Security for Hostile Environments |
03-05-2017 16:00 | Kevin Feasel | 24 Hours of PASS (60 minutes) | Application & Database Development | Outlier Detection With SQL And R |
03-05-2017 17:00 | Robert Davis | 24 Hours of PASS (60 minutes) | Application & Database Development | Securing SQL Server Processes with Certificates |
03-05-2017 18:00 | Brian Kelley | 24 Hours of PASS (60 minutes) | BI Platform Architecture, Development & Administration | Protecting Data Across the Environment |
03-05-2017 19:00 | Kathi Kellenberger | 24 Hours of PASS (60 minutes) | Enterprise Database Administration & Deployment | Configuring Kerberos Delegation for SSRS |
03-05-2017 20:00 | Michelle Gutzait | 24 Hours of PASS (60 minutes) | Enterprise Database Administration & Deployment | Implementing the Most Common Security Standard Regulations in SQL Server and Azure |
03-05-2017 21:00 | Ed Leighton-Dick | 24 Hours of PASS (60 minutes) | Enterprise Database Administration & Deployment | Protecting Your Data with Encryption |
03-05-2017 22:00 | Virginia Mushkatbat | 24 Hours of PASS (60 minutes) | Application & Database Development | Sensitive Data Warriors: Always On Encryption and Data Masking |
03-05-2017 23:00 | Karen Lopez | 24 Hours of PASS (60 minutes) | Application & Database Development | Four New Table Level Security Features of SQL Server 2016 |
04-05-2017 00:00 | Dan de Sousa | 24 Hours of PASS (60 minutes) | Application & Database Development | Ooops, data breach? Not with Always Encrypted |
04-05-2017 01:00 | John Deardurff | 24 Hours of PASS (60 minutes) | Application & Database Development | Securables, Principals, and Permissions |
04-05-2017 02:00 | Argenis Fernandez | 24 Hours of PASS (60 minutes) | Enterprise Database Administration & Deployment | Modern Security Attack Vectors against SQL Server Environments |
04-05-2017 03:00 | Peter Myers | 24 Hours of PASS (60 minutes) | BI Platform Architecture, Development & Administration | Securing SQL Server 2016 Enterprise Information Management |
04-05-2017 04:00 | Denny Cherry | 24 Hours of PASS (60 minutes) | Cloud Application Development & Deployment | How to Maintain the Same Level of utilities in Cloud Deployments |
04-05-2017 05:00 | Ginger Grant | 24 Hours of PASS (60 minutes) | Cloud Application Development & Deployment | IoT Security: Process and Monitoring |
04-05-2017 06:00 | Ed Leighton-Dick | 24 Hours of PASS (60 minutes) | Application & Database Development | Extending Applications Securely Using Service Broker |
04-05-2017 07:00 | Mladen Prajdić | 24 Hours of PASS (60 minutes) | Enterprise Database Administration & Deployment | SQL Server and Application Security For Developers |
04-05-2017 08:00 | Joseph D'Antoni | 24 Hours of PASS (60 minutes) | Cloud Application Development & Deployment | Building Secure Applications in Azure SQL Database |
04-05-2017 09:00 | Neil Hambly | 24 Hours of PASS (60 minutes) | Enterprise Database Administration & Deployment | SAy our Security Right (or Not) |
04-05-2017 10:00 | André Melancia | 24 Hours of PASS (60 minutes) | Enterprise Database Administration & Deployment | Hacking SQL Server |
04-05-2017 11:00 | Geri Reshef | 24 Hours of PASS (60 minutes) | Enterprise Database Administration & Deployment | Row Level Security (RLS) - a deep dive |
Event Date: 03-05-2017 12:00 - Category: 24 Hours of PASS (60 minutes) - Track: Application & Database Development
Event Date: 03-05-2017 13:00 - Category: 24 Hours of PASS (60 minutes) - Track: Application & Database Development
Event Date: 03-05-2017 14:00 - Category: 24 Hours of PASS (60 minutes) - Track: Enterprise Database Administration & Deployment
Event Date: 03-05-2017 15:00 - Category: 24 Hours of PASS (60 minutes) - Track: Enterprise Database Administration & Deployment
Event Date: 03-05-2017 16:00 - Category: 24 Hours of PASS (60 minutes) - Track: Application & Database Development
Event Date: 03-05-2017 17:00 - Category: 24 Hours of PASS (60 minutes) - Track: Application & Database Development
Things like Trustworthy and cross-database ownership chaining open up huge security threats. Fortunately, there’s a better way.
You can secure things like cross-database operations, service broker communication, and high-privileged stored procedure execution with certificates via a process call signing. Additionally things like CLR assemblies that need external access can be executed safely using signed assemblies instead of enabling Trustworthy.
This session will cover common processes that can be secured through certificate signing, show how to sign the processes, and cover some basics of certificate management.
Note: this session does not cover securing SQL Server connections with SSL or self-signed certificates.
Event Date: 03-05-2017 18:00 - Category: 24 Hours of PASS (60 minutes) - Track: BI Platform Architecture, Development & Administration
Event Date: 03-05-2017 19:00 - Category: 24 Hours of PASS (60 minutes) - Track: Enterprise Database Administration & Deployment
Event Date: 03-05-2017 20:00 - Category: 24 Hours of PASS (60 minutes) - Track: Enterprise Database Administration & Deployment
Event Date: 03-05-2017 21:00 - Category: 24 Hours of PASS (60 minutes) - Track: Enterprise Database Administration & Deployment
Event Date: 03-05-2017 22:00 - Category: 24 Hours of PASS (60 minutes) - Track: Application & Database Development
Event Date: 03-05-2017 23:00 - Category: 24 Hours of PASS (60 minutes) - Track: Application & Database Development
Event Date: 04-05-2017 00:00 - Category: 24 Hours of PASS (60 minutes) - Track: Application & Database Development
In this session, learn how to set up an "Always Encrypted" environment, the technicalities of the feature including the use of a security certificate, loading data into an "Always Encrypted" enabled environment, some limitations of the feature and if time permits, look into a real use case of the feature. You will leave this session with an understanding of the Always Encrypted feature in SQL Server 2016 as well as how to start working with it.
Event Date: 04-05-2017 01:00 - Category: 24 Hours of PASS (60 minutes) - Track: Application & Database Development
Event Date: 04-05-2017 02:00 - Category: 24 Hours of PASS (60 minutes) - Track: Enterprise Database Administration & Deployment
Event Date: 04-05-2017 03:00 - Category: 24 Hours of PASS (60 minutes) - Track: BI Platform Architecture, Development & Administration
Event Date: 04-05-2017 04:00 - Category: 24 Hours of PASS (60 minutes) - Track: Cloud Application Development & Deployment
We'll review the common mistakes which people make when deploying SQL Server Virtual Machines to Azure which can lead to security problems including data breaches.
We'll review the common performance problems which people encounter, and how to resolve them.
We'll review the common scalability misunderstandings of Azure and SQL Server Virtual Machines.
Join us for this fun session and learn how to improve the security, reliability and scalability of your Azure deployments of SQL Server 2016.
Event Date: 04-05-2017 05:00 - Category: 24 Hours of PASS (60 minutes) - Track: Cloud Application Development & Deployment
In this session, we will explore the security risks in IoT implementations. Examining the risks of IoT systems can help determine how to foil certain events, such as preventing access of applications which are designed to remotely seize control of IoT devices and mitigating the risks involved in IoT data transmissions. We will examine Azure IoT solutions to assess how Microsoft’s IoT implementation addresses risks and the development steps which need to be implemented when applications are created and deployed. Data analysis’ importance in analyzing IoT devices will be discussed, including how Stream Analytics and Azure ML can be implemented as a key element to the ongoing security and maintenance of IoT devices and IoT systems.
Event Date: 04-05-2017 06:00 - Category: 24 Hours of PASS (60 minutes) - Track: Application & Database Development
Event Date: 04-05-2017 07:00 - Category: 24 Hours of PASS (60 minutes) - Track: Enterprise Database Administration & Deployment
In this session we'll look at a few attack vectors that can be used against your company, and what you as a developer can and should do to protect against them. It will involve a good mix of security conscious SQL Server and application development, because you care about your work and nobody messes with you.
Event Date: 04-05-2017 08:00 - Category: 24 Hours of PASS (60 minutes) - Track: Cloud Application Development & Deployment
Azure provides extremely robust security protection at the physical, logical, and data layers of its services and applications, making Azure datacenters among the most secure facilities of their kind in the world. Likewise, Azure SQL Database includes multiple layers of security, with role-based logical data protection and auditing to monitor the security of your data
Event Date: 04-05-2017 09:00 - Category: 24 Hours of PASS (60 minutes) - Track: Enterprise Database Administration & Deployment
During this session we will examine how to put in the right level of security, evaluate and define an appropriate database security model that is right for the environment. We will be covering SQL Server’s security hierarchy and terminology, identify security risks (know your security responsibilities), determine when SA usage is appropriate and not and more.
Event Date: 04-05-2017 10:00 - Category: 24 Hours of PASS (60 minutes) - Track: Enterprise Database Administration & Deployment
In this session we'll see examples on how to exploit SQL Server, modify data and take control, while at the same time not leaving a trace. We'll start by gaining access to a SQL Server (using some "creative" ways of making man-in-the-middle attacks), escalating privileges and tampering with data at the TDS protocol level (e.g. changing your income level and reverting without a trace after payment), hacking DDM, and more. Most importantly, we'll also cover recommendations on how to avoid these attacks, and take a look at the pros and cons of new security features in SQL Server 2016. This is a demo-driven session, suited for DBAs, developers and security consultants.
Event Date: 04-05-2017 11:00 - Category: 24 Hours of PASS (60 minutes) - Track: Enterprise Database Administration & Deployment
and will implement it in solving different real world scenarios like hierarchical organization, role based security system, application based security system; and deal with performance considerations.