• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Cso oow12-summit-sonny-sing hv4
 

Cso oow12-summit-sonny-sing hv4

on

  • 2,289 views

 

Statistics

Views

Total Views
2,289
Views on SlideShare
2,284
Embed Views
5

Actions

Likes
0
Downloads
4
Comments
0

5 Embeds 5

http://blogs.oracle.com 1
http://open.dapper.net 1
http://flavors.me 1
http://www.hanrss.com 1
http://news.google.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Cso oow12-summit-sonny-sing hv4 Cso oow12-summit-sonny-sing hv4 Presentation Transcript

    • 1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • The Threats are OutsideThe Risks are InsideSonny SinghSenior Vice PresidentIndustries Business Unit2 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • 3. Financial Loss 2. Regulatory Fines 1. Brand Decline3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • on Security response has been reactive, shifted attention away from apps and data 2007 2010 Forrester Evolution of IT Security 20114 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • •  Endpoint Security •  Vulnerability Management •  Network Security $400 – $500 •  Email Security average cost of security •  Other Security breached hacking from breached privilege records web against records db stolen misuse app server Gartner IT Key Metrics 2010 servers credentials servers Verizon Data Breach 20125 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Verizon Data Breach 2012 hacking involved stolen credentials APPLICATIONS MIDDLEWARE breached records from web/app servers DATABASE breached records from db servers OPERATING SYSTEM from privilege misuse attacks against servers SERVERS breaches against off line data STORAGE breaches against file servers6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • LinkedIn RISKS Sony were on the Société Générale7 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • MANAGE THE RISKS SECURITY INSIDE PREVENT THE THREATS OUT EMPOWER THE OPPORTUNITIES8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • SECURITY SECURITY SECURITY AT EACH LAYER BETWEEN LAYERS BETWEEN SYSTEMS SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY9 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • Services & Consulting Governance & Compliance Identity Management SOLUTIONS Database Security SOLUTIONS Infrastructure Security10 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • 11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    • 12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.