cso oow12-summit-sonny-sing hv4
DESCRIPTION
TRANSCRIPT
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 1
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 2
The Threats are Outside The Risks are Inside
Sonny Singh Senior Vice President Industries Business Unit
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 3
1. Brand Decline
2. Regulatory Fines
3. Financial Loss
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 3
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 4
response has been reactive, shifted attention away from apps and data
2007 2010
on Security
Forrester Evolution of IT Security 2011
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 5
• Endpoint Security • Vulnerability Management
• Network Security • Email Security
• Other Security average cost of security
$400 –$500
breached records web\app server
against servers
breached records db
servers
hacking from
stolen credentials
privilege misuse
Verizon Data Breach 2012
Gartner IT Key Metrics 2010
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 6
APPLICATIONS
MIDDLEWARE
DATABASE
OPERATING SYSTEM
SERVERS
STORAGE
hacking involved stolen credentials
breached records from web/app servers
breached records from db servers
from privilege misuse
attacks against servers breaches against off line data
breaches against file servers
Verizon Data Breach 2012
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 7
Société Générale
Sony
LinkedIn RISKS were on the
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 8
SECURITY INSIDE OUT
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 8
MANAGE THE RISKS
EMPOWER THE OPPORTUNITIES
PREVENT THE THREATS
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 9
SECURITY BETWEEN SYSTEMS
SECURITY AT EACH LAYER
SECURITY BETWEEN LAYERS
SECURITY
SECURITY
SECURITY
SECURITY
SECURITY
SECURITY
SECURITY
SECURITY
SECURITY
SECURITY
SECURITY
SECURITY
SECURITY
SECURITY
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 10
Identity Management
Services & Consulting
Infrastructure Security
Database Security
Governance & Compliance
SOLUTIONS SOLUTIONS
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 11
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 12