My Sessions

I offer a variety of sessions focusing primarily on SQL Server technologies.

I offer onsite presentations to User Groups and at conferences around the country!

I am able to offer any of the listed sessions or can work with you to develop a session to cover what you need.

Abstracts

Do you suffer from Recovery Amnesia?

You have a complete strategy to backup your SQL environment; but what about the recovery?

Is that even part of your strategy?

Through this introductory session we will review the various aspects & myths of backups in SQL Server. We will pin down how developing a recovery strategy to meet business requirements is, in fact, more important than just a good backup strategy.

Summary: Did you know that, by default, SQL Server does not protect connections to your data?

Learn just how much is exposed, and just how simple it is to enable connection encryption using an SSL certificate.

Abstract: You know all the ways to protect your database when it is at rest, but what about when someone connects and starts running some queries? What if they connect and don’t do anything? Just how exposed is that data?

We will assume the role of a hacker and, by using a simple technique, we will sniff packets on a network to reveal what data is being sent. You may be shocked!

We will then secure our database connections with a simple self-signed SSL certificate.

Once secured, we will resume the role of the hacker and look inside the packets to see what has changed.

*Warning – Do not try these demos at work without proper permissions as actual hacking techniques are used.

PreReqs: This session only requires you to have a basic knowledge of SQL Server configuration and an interest in protecting the data in your database.

Goal 1: Learn what is exposed when using the default, unprotected connections to SQL Server

Goal 2: Learn how to configure SQL Serve to use an SSL certificate to encrypt connections

Goal 3: Learn ways, with proper permission, to capture and check network packet to confirm data in transit is protected

Addtl Notes: This session is designed to engage beginner through experienced SQL Server users via basic configurations and tools, yet diving deep into the internals to see how SQL Server is working with the security settings

Summary: Compliance. The dreaded word. If you use, or are thinking about using, Transparent Data Encryption to be compliant with some regulation, do you know how transparent it is?

Learn how much data, if any, is exposed when you use TDE on your SQL Server.

Abstract: You have to be compliant, but can’t change source code, or SQL code. What’s your option? Transparent Data Encryption (TDE) of course!

The real question though, is just how transparent is TDE?

In the second installment of the Hacking Exposé series, we will assume the role of a hacker once more and dig into our database and steal our backups and data files. We will then try to restore the files, and even dig into the files themselves and see what might be exposed.

We then go through the steps to lock down our data using TDE.

Once again we assume the role of a hacker and try to dig through the database, steal backups and data files and see just what is available to us.

*Warning – Do not try these demos at work without proper permissions as some actual hacking techniques are used.

PreReqs: This session only requires you to have a basic knowledge of SQL Server configuration and an interest in protecting the data in your database.

Goal 1: Learn exactly what is protected by TDE

Goal 2: Learn how to configure and implement TDE

Goal 3: Learn ways, with proper permission, to see just how much might be exposed when using TDE

Addtl Notes: This session is designed to engage beginner through experienced SQL Server users via basic configurations and tools, yet diving deep into the internals to see how SQL Server is working with the security settings

Summary: SQL Server features a lot of different fully integrated options to protect your data.

This demo-free session goes over a majority of the features available so you can make the best decision of which of them to combine and use to protect your data in your environment.

Abstract: You have lots of data painstakingly collected over the years.

How do you ensure that all your hard work is protected from hackers, spies and other ne’er-do-wells?

Having knowledge of the vast array of security features available in SQL Server is the first step in helping determine what actions you need to take to protect your data.

This session will quickly go through a majority of the security features in SQL Server, to help you learn what each does, and let you determine which features work best for your situation.

*Note – This session is demo-free.

PreReqs: This session only requires you to have a basic knowledge of SQL Server and an interest in protecting the data in your database.

Goal 1: Learn what security features are available in SQL Server

Goal 2: Learn how each works at a high level

Goal 3: Be able to determine which security features to combine to protect your data

Addtl Notes: This session is demo-free. It has been shown that any demo directly influences choices and actions via observational learning. Because security is a fairly sensitive topic the choice was made to relay a LOT of basic information in a condensed time rather than focus on a single topic or feature with demos.

As a SQL Server DBA I see my role having 2 main focuses. First is to protect the data and second is to ensure performance is maximized. More often than not companies forget about data security when they focus on performance tuning. In this presentation I will mention a few cases where encryption could have saved a lot of hassle. I will then demo a method that can be used to “index” commonly searched on encrypted values (ex: SSNs, Credit Card, etc) helping reduce the impact on the performance of a query.
Summary:

This session not only discusses and shows what statistics are but how, when paired with the cardinality estimator, they have a significant impact on the performance of your SQL queries.

Abstract:

Are your statistics up to date?

Yes, it’s that dreaded phrase you hear all the time when it comes to performance tuning your SQL Server. What does it matter? Why should I care about statistics? Aren’t they automatic or something like that?

In this session we will go over why statistics matter, how they are generated, how they impact performance, and even how to maintain them. Once we have that all settled, we will take a quick look at how the cardinality estimator uses statistics to determine a ‘good enough’ plan to use. We will close out the session by taking a look at the performance impact a simple upgrade of your SQL Server to 2014 and the new cardinality estimator can have.

 

PreReqs: This session only requires you to have a basic knowledge of SQL Server and an interest in learning more about how the engine works behind the scenes.

 

Goal 1: Learn what SQL Statistics really are

Goal 2: Learn how statistics are generated

Goal 3: Understand how statistics and cardinality work together to find data efficiently

Summary: Learn a simple method to load data via SSIS while identifying, removing, and recording any bad records encountered allowing you to maximize the quantity and integrity of the data loaded.

 

Abstract:

Loading data via SSIS is great! It’s fast too! Until you hit a bad record. Then things aren’t so great. Now you probably have to waste time dumping and reloading all the data, or worst figure out where the bad record is and try a partial load.

In this session you will learn a simple method to load data via SSIS and identify, remove, and record those bad records allowing you to maximize the amount of data loaded while ensuring data integrity.

 

PreReqs: Basic knowledge of SSIS and data load process.

 

Goal 1: Learn to filter bad data from your data loads

Goal 2: Learn to maximize the speed of your load, even with bad data

Goal 3: Ensure maximum data loaded while maintaining its integrity.