Jump to content

2015 DevCon Security Program


This topic is 2817 days old. Please don't post here. Open a new topic instead.

Recommended Posts

At the upcoming 20th FileMaker Developer Conference to be held in Las Vegas, Nevada, July 20-23, I am pleased to have the opportunity to present a program entitled “What Would I Find If I Did A Security Audit Of Your FileMaker System?”

 

 

So far in 2015 we seem well on the way to having a record-breaking year for data breaches. Simply stated, we are now in an era of continuous breaches, some of them very significant in terms of the number of, and the sensitivity of, data records exposed. 

Organizations must expect they will suffer breaches. The question has now become, “How can losses be held to a minimum?” when a breach occurs.  Some observers and information security experts have labeled this concept as the safe breach. While I am not particularly enamored with that terminology, it nevertheless reflects a realistic viewpoint about the state of information security today.

 

In over two decades of FileMaker Platform work, through all nineteen prior Developer Conferences I have attended, I have seen a large number of vulnerabilities in deployed FileMaker Platform systems. FileMaker security vulnerabilities usually stem from one or more of four sources. In this session to be held on Wednesday, July 22, at 3:45 PM. I will review a number of these vulnerabilities and describe how to close them. I will also describe the type of attacks these vulnerabilities can facilitate if they remain open.

 

Steven H. Blackwell

Link to comment
Share on other sites

This topic is 2817 days old. Please don't post here. Open a new topic instead.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.