Opening Remarks Dave Profozich Group Vice President North America Security, Oracle
Aug 20, 2015
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Confidential — Oracle Internal2
HOW BIG IS OPEN WORLD?
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.3
AMERICA’S CUP BIGGER & FASTER
72’ LENGTH
46’ WIDTH
131’MAST
50 MPH
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.4
DESIGNED FOR CONTROL
300+ SENSORS
ANALYZING OVER
30,000PIECES OF DATA
PER SECOND
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.5
WELCOME TO THE CSO SUMMIT @ OPEN WORLD
ACCELERATE YOUR BUSINESSWITH CONTROL & CONFIDENCE
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.6
GLOBAL Audience
18 COUNTRIES 100%SECURITYCONSCIOUS 12
VERTICALMARKETS
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Oracle Confidential Restricted7
MOBILE & CLOUDDIGITAL MARKETING
& SOCIAL MEDIACOMPLIANCE & RISK
SECURITY IS TOP OF MIND
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.8
QUALITY
SECURITY DNA
Identity Management
Infrastructure Security
Services & Consulting
Database Security
Governance & Compliance
SECURE SOLUTIONS & SECURITY SOLUTIONS
• Started 1977• Market Leading Products• Dedicated Business• Aggressive R & D
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.9
INSIDEOUT
SECURITYDEFENSEIN-DEPTH
SECUREWHAT’SSTRATEGIC
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.9
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Oracle Confidential Restricted10
Embedded Security Inside Out Video in final copy
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.11
101110000001
1 011011100011
101110
000
0 01
1
011011100011
101110
000
0 01
1011011100011
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.11
AGENDA08:30 Welcome Remarks
08:45 The Identity of Things
09:05 Identity for The Provider Economy
09:50 Security Year in Review
10:30 Break (15 Minutes)
10:45 Innovations in Database Security
11:05 Best Practices in Database Security
11:50 Closing Remarks
12:05 Lunch