Latest Past Events

Oracle Database Attack Surface Reduction Master Class (Sydney Master Class)

Sydney Sydney

Dan Morgan’s Oracle Database Attack Surface Reduction Master Class has been designed for an audience of senior technologists, DBAs and Developers, as well as senior Information Security professionals not put off by technical details and demonstration live in SQL*Plus. In Scope for this workshop are unpublished exploits, undocumented parameters, and more than 730 configuration changes that can impact the ability of an Oracle Database to survive a sophisticated attack by persons and bots even if they have phished valid credentials. Out of scope for this workshop are options, licenses, and products. The Workshop’s goal is to provide information security professions

Oracle Database Attack Surface Reduction Master Class (Perth Master Class)

Perth Perth

Dan Morgan’s Oracle Database Attack Surface Reduction Master Class has been designed for an audience of senior technologists, DBAs and Developers, as well as senior Information Security professionals not put off by technical details and demonstration live in SQL*Plus. In Scope for this workshop are unpublished exploits, undocumented parameters, and more than 730 configuration changes that can impact the ability of an Oracle Database to survive a sophisticated attack by persons and bots even if they have phished valid credentials. Out of scope for this workshop are options, licenses, and products. The Workshop’s goal is to provide information security professions

Oracle Database Attack Surface Reduction Master Class (Melbourne Master Class)

Dan Morgan’s Oracle Database Attack Surface Reduction Master Class has been designed for an audience of senior technologists, DBAs and Developers, as well as senior Information Security professionals not put off by technical details and demonstration live in SQL*Plus. In Scope for this workshop are unpublished exploits, undocumented parameters, and more than 730 configuration changes that can impact the ability of an Oracle Database to survive a sophisticated attack by persons and bots even if they have phished valid credentials. Out of scope for this workshop are options, licenses, and products. The Workshop’s goal is to provide information security professions