Frank Rietta

Frank Rietta

Ruby on Rails Security Expert

Location
Greater Atlanta Area
Industry
Computer Software

As a LinkedIn member, you'll join 300 million other professionals who are sharing connections, ideas, and opportunities.

  • See who you and Frank Rietta know in common
  • Get introduced to Frank Rietta
  • Contact Frank Rietta directly

View Frank's full profile

Frank Rietta's Overview

Current
Past
  • Director of Membership at Metro Atlanta Information Systems Security Association
  • Owner at Rietta Solutions
  • CIS Internship Coordinator at J. Mack Robinson College of Business
  • Owner at Atlanta Web Host
  • Vice-President at Georgia Tech ACM
  • President at Georgia Tech ACM
Education
Websites

Frank Rietta's Summary

I am looking to connect with organizations that are looking for a Ruby on Rails Developer who can partner effectively with their team. The companies we work best with have an entrepreneurial outlook and embrace the principles of Agile software development.

We deliver software in short, one week, iterations to keep up with the speed of your business. Learn more about how our process helps companies launch new web applications at
http://rietta.com/process

The three services that I offer to the public are:
- Full Service Web Application Development
- Support for Ruby on Rails in Production, Scaling and Security
- Information Security, Emergency Support

These are explained in detail on my website at
http://rietta.com/services

Below, please enjoy this video from my most recent class lecture on data breaches and what a Ruby developer can do to help mitigate them. The second video is the presentation on Remote Pair Programming that Brandon Dees and I gave to the Atlanta Ruby Users' Group in October, 2013.

Frank Rietta's Experience

Founder & Software Developer

RIETTA INC

Privately Held; 11-50 employees; Information Technology and Services industry

April 2006Present (8 years 6 months) Johns Creek, GA

As a computer scientist with an information security specialization, the work that I enjoy the most is helping clients design new web applications from the ground up to support their company's effort to discover a viable business model by producing a minimum viable product and then iterating on the idea to grow it based upon real customer feedback.

This is a lean startup approach that was pioneered by Steve Blank of Stanford University and has proven to be effective for Rietta's customers. My principle goal in all of this is creating secure web applications that can help my clients' businesses grow to scale on the Internet while protecting their customers' data.

Director of Membership

Metro Atlanta Information Systems Security Association

January 2007January 2008 (1 year 1 month) Atlanta, Georgia

Maintained contact with the various members of the professional society. Represented the society at a variety of security conferences, including the KSU Cyber Crime Summit and the SecureWorld Expo. Helped organize the Metro Atlanta ISSA Conference.

Privately Held; 11-50 employees; Information Technology and Services industry

January 1999December 2006 (8 years) Duluth, Georgia

I began my journey as an entrepreneur early in life. Beginning while I was still a teenager, I created Rietta Solutions to develop shareware applications, some of which were downloaded at least 300,000 times and featured in magazines in the United States, the United Kingdom, and Germany! This was a period that I also began working as a freelance web developer and launched Atlanta Web Host, which was a somewhat prominent local hosting provider during the shared web hosting boom of 2000 to 2003.

CIS Internship Coordinator

J. Mack Robinson College of Business

February 2006June 2006 (5 months) Atlanta, Georgia

While I was taking classes at the Robinson College of Business, I helped Computer Information Systems students navigate the internship process to get degree credit while they gained work experience through internships.

Owner

Atlanta Web Host

April 2000November 2005 (5 years 8 months) Duluth, Georgia

Managed Unix-based (FreeBSD and Linux) web hosting operations and sales. Provided on-call customer support and dealt extensively with sales and marketing of the services. Handled all levels of customer support problems and customer satisfaction. Left when I sold the business to Atlanta Networking & Computer Help, Inc.

Vice-President

Georgia Tech ACM

Educational Institution; 5001-10,000 employees; Higher Education industry

May 2004May 2005 (1 year 1 month)

I presided at meetings where the President of the chapter was not present, assisted the President in the management of the chapter, managed the committees by keeping a record of all their proceedings, raised funds for the programming team, and performed other duties that were necessary. At the conclusion of my term as VP, I was awarded the honorary title of President Emeritus for my work with the student chapter.

President

Georgia Tech ACM

Educational Institution; 5001-10,000 employees; Higher Education industry

May 2002May 2004 (2 years 1 month)

I was the principal officer and was responsible for leading the chapter and managing its activities in accordance with the policies and procedures of the ACM, Georgia Tech, and the GTACM bylaws. I presided at all meetings of the chapter and of its Executive Council. In addition, I helped the Treasurer maintain a proper record of the chapter's finances. I also participated with and raised funds for the programming team, which competed in the ACM world finals in 2004, 2005, and now in 2006.

Frank Rietta's Publications

  • Application layer intrusion detection for SQL injection

    • Association for Computing Machinery (ACM) South Eastern Conference
    • 2006
    Authors: Frank Rietta

    SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the applications and not the database directly, there are some techniques that can be deployed to mitigate the risk at the database server. Database intrusion detection systems are often based on signatures of known exploits and honey tokens, traps set in the database. This paper examines the threat from SQL injection attacks, the reasons traditional database access control is not sufficient to stop them, and some of the techniques used to detect them. Moreover, it proposes a model for an anomalous SQL detector which observes the database traffic from the perspective of the database server itself. The proposed anomaly model can be used in conjunction with the existing methods to give the database server a way to mitigate the SQL injection risk that is a major application security problem.

  • Cybersecurity in Africa: An Assessment

    • Sam Nunn School of International Affairs
    • April 25, 2008
    Authors: Frank Rietta, Kristina Cole, Marshini Chetty, Christopher LaRosa, Dankia K. Schmitt, Seymour E. Goodman

    We set out to assess the efforts of African nations in the realm of cybersecurity. When approaching this problem, we felt that national security as a motivation for cybersecurity may not be entirely appropriate for developing nations. Many developing nations possess neither robust critical infrastructures that utilize digital control systems nor highly digitized militaries, and thinking about cybersecurity issues in relation to these systems therefore may not make sense. We sought to determine how to implement cybersecurity in less developed countries, if it is not an issue solely associated with national security

Frank Rietta's Skills & Expertise

  1. Ruby on Rails
  2. MySQL
  3. PHP
  4. Database Security
  5. Web Application Design
  6. Web Application Security
  7. Ruby
  8. Small Business
  9. Entrepreneurship
  10. Security
  11. JavaScript
  12. Java
  13. CSS
  14. Mobile Applications
  15. Start-ups
  16. Objective-C
  17. Software Development
  18. Information Security
  19. Business Intelligence
  20. Web Applications
  21. Lean Startup
  22. Unix Shell Scripting
  23. PostgreSQL
  24. Git
  25. SQL
  26. Software Engineering
  27. Programming
  28. Test Driven Development
  29. REST
  30. Agile Methodologies
  31. Apache
  32. Amazon Web Services (AWS)
  33. Android
  34. Software Design
  35. JSON
  36. Web Development
  37. iOS development
  38. HTML 5
  39. Python
  40. Linux
  41. Subversion
  42. Unix

View All (42) Skills View Fewer Skills

Frank Rietta's Courses

  • MS, CS/InfoSec

    Georgia Institute of Technology

    • Applied Cryptography (CS 6260)
    • Secure Computer Systems (CS 6238)
    • Info Security Policies (CS 6725)
    • Network Security (CS 6262)
    • Special Problems Information Security Practicum (CS 8902)
  • Georgia State University

    • Financial Accounting (MBA 7010)
    • Business Analysis (MBA 7020)
    • Strategic Business Communication (MBA 8015)
    • Security and Privacy of Information and Information Systems (CIS 8080)

Frank Rietta's Education

Georgia Institute of Technology

MS, CS/InfoSec

20062007

Activities and Societies: ACM, UCSB International Capture the Flag Competition

Georgia State University

20062006

Activities and Societies: Golden Key International Honour Society

Universitat Politècnica de Catalunya

n/a, Computer Science

20052005

Attended Georgia Tech classes at the UPC campus while studying in Spain as a student at Georgia Tech.

Activities and Societies: Barcelona Summer Study Abroad

Georgia Institute of Technology

BS, Computer Science

20012005

Activities and Societies: ACM, Georgia Tech Radio Club, College of Computing Undergraduate Council, Campus Crusade for Christ

Frank Rietta's Organizations

  • Perimeter Church

    Technical Team Volunteer
  • Scriptive

    • August 2012 to Present

    The Rietta team is proud to work with Scriptive.org to support their mission of connecting biblical scripture with peoples' everyday lives.

  • Paynate

    • November 2012 to Present

    The Rietta team is proud to work with Paynate.com to support their mission of supporting worthy causes by raising awareness and funds.

  • Atlanta Ruby Users Group

    http://meetup.com/atlantaruby

Contact Frank for:

  • consulting offers
  • expertise requests
  • business deals
  • reference requests
  • getting back in touch

View Frank Rietta’s full profile to...

  • See who you and Frank Rietta know in common
  • Get introduced to Frank Rietta
  • Contact Frank Rietta directly

View Frank's full profile