Top Banner
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 1
12

Cso oow12-summit-sonny-sing hv4

Nov 18, 2014

Download

Documents

OracleIDM

 
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cso oow12-summit-sonny-sing hv4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 1

Page 2: Cso oow12-summit-sonny-sing hv4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 2

The Threats are Outside The Risks are Inside

Sonny Singh Senior Vice President Industries Business Unit

Page 3: Cso oow12-summit-sonny-sing hv4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 3

1. Brand Decline

2. Regulatory Fines

3. Financial Loss

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 3

Page 4: Cso oow12-summit-sonny-sing hv4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 4

response has been reactive, shifted attention away from apps and data

2007 2010

on Security

Forrester Evolution of IT Security 2011

Page 5: Cso oow12-summit-sonny-sing hv4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 5

•  Endpoint Security •  Vulnerability Management

•  Network Security •  Email Security

•  Other Security average cost of security

$400 –$500

breached records web\app server

against servers

breached records db

servers

hacking from

stolen credentials

privilege misuse

Verizon Data Breach 2012

Gartner IT Key Metrics 2010

Page 6: Cso oow12-summit-sonny-sing hv4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 6

APPLICATIONS

MIDDLEWARE

DATABASE

OPERATING SYSTEM

SERVERS

STORAGE

hacking involved stolen credentials

breached records from web/app servers

breached records from db servers

from privilege misuse

attacks against servers breaches against off line data

breaches against file servers

Verizon Data Breach 2012

Page 7: Cso oow12-summit-sonny-sing hv4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 7

Société Générale

Sony

LinkedIn RISKS were on the

Page 8: Cso oow12-summit-sonny-sing hv4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 8

SECURITY INSIDE OUT

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 8

MANAGE THE RISKS

EMPOWER THE OPPORTUNITIES

PREVENT THE THREATS

Page 9: Cso oow12-summit-sonny-sing hv4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 9

SECURITY BETWEEN SYSTEMS

SECURITY AT EACH LAYER

SECURITY BETWEEN LAYERS

SECURITY

SECURITY

SECURITY

SECURITY

SECURITY

SECURITY

SECURITY

SECURITY

SECURITY

SECURITY

SECURITY

SECURITY

SECURITY

SECURITY

Page 10: Cso oow12-summit-sonny-sing hv4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 10

Identity Management

Services & Consulting

Infrastructure Security

Database Security

Governance & Compliance

SOLUTIONS SOLUTIONS

Page 11: Cso oow12-summit-sonny-sing hv4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 11

Page 12: Cso oow12-summit-sonny-sing hv4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 12