0
1

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
The following is intended to outline our general product direction. It
is intended for information purposes only, and may ...
Gestione los
Riesgos, prevenga las
Amenazas y descubra las
Oportunidades
José Manuel Rodríguez
Security Business Developme...
La
Experiencia Digital

Cloud

Móvil

4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Social
COMPLEJIDAD CRECIENTE

• Recursos constantes

5

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
6

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
La Seguridad es una cuestión estratégica
El número y complejidad de las amenazas externas aumenta

6M Passwords
robadas

L...
El Riesgo amenaza el Negocio
Marca, reputación, responsabilidad, valor para el accionista

Sony
3x Reducción
del Valor de ...
Oracle: Seguridad desde el Interior

Social
Social
BLOG
BLOG

Datos

9

Copyright © 2012, Oracle and/or its affiliates. Al...
Oracle: Seguridad desde el Interior

Social
Social

SEGURIDAD
BASE DE DATOS

Datos

10

Copyright © 2012, Oracle and/or it...
SEGURIDAD DE LAS

11

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Sanidad
Online

Servicios al
Ciudadano

Mayor proceso de

Social
Transformación Retail
del Negocio

Servicios
Cloud

Banca...
13

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Todo tipo de dispositivos

5900M

Dispositivos hoy
~30% conectados a
redes corporativas

Source: Mobility Revolution Redux...
MAS
15

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

DE LOS QUE PODEMOS
NUEVOS

16

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Sign-On Móvil

•

SEGURIDAD

•

Detecció...
10% almacenan passwords sin cifrar

58%
Construyendo
App stores móviles
Fuente: Partnerpedia
Survey Aug 2011
17

Copyright...
Seguridad de Aplicaciones Móviles

18

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
El Contexto es importante
John Smith

Password

Seguimiento Localización
Dispositivo

Riesgo de
Transacción

Comportamient...
Integración con redes sociales
Selección

20

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Autent...
la seguridad de
aplicaciones y SSO a los
dispositivos móviles.
autenticación y autorización
independiente del dispositivo....
Simplificar la Administración a gran escala

Aplicaciones
Carro

Administradores

22

Copyright © 2012, Oracle and/or its ...
Solucion Completa de Gestión de Identidades

Provisioning
Certificación de
Accesos
Gestión de Roles
Administración
delegad...
SEGURIDAD DEL

24

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
•

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Robo de Credenciales

•

Acceso Excesivo
Inyecció...
Los datos no están sólo en Producción
Datos
Sensibles

Partners

26

Temp

Copyright © 2012, Oracle and/or its affiliates....
Fuentes de amenaza
Los ataques pueden venir de cualquier parte

Cuentas de
Administracion
Aplicaciones

Test & Dev
Operaci...
OPERADOR

DATA CENTER

PARTNERS

EMPLEADOS
CONTRACTORS

28

Copyright © 2012, Oracle and/or its affiliates. All rights res...
ÁREAS

3
DE FOCO
29

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

• Pérdida, acceso inapropiado a...
Seguridad en la Nube: control más difícil
ALTO

MEDIOBAJO

RIESGO

MEDIOALTO

Cloud Pública
Cloud Privada Hosted

Cloud Pr...
• Pérdida, acceso inapropiado a

PROBLEMAS
•

6
PRINCIPALES

en
operación y administración

•

. Normativas de
protección ...
Seguridad Oracle para Bases de Datos
PREVENCIÓN

ADMINISTRACIÓN

Cifrado

Monitorización de
Actividdad

Analisis de Privil...
Agenda
09.00 Registro y bienvenida
09.30 Gestione los riesgos, prevenga las amenazas y descubra las oportunidades
Jose Man...
SECURITY
INSIDE
OUT

34

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protecti...
Upcoming SlideShare
Loading in...5
×

01 manage Risk prevent threat sun lock opportunities

275

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
275
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • The imperative for many organizations is to capture customers and provide a great experience both in products and service.Organizations will deploy more services in the cloud to make it easy for customers to adopt and pay as you go The risks are How do you manage the liability that comes with fraud and stolen credentials ?How do you protect your customers and provide the visibility for them to manage their security ?How do you create the confidence to assure customers their data is safeHow many of you changed your linked in passwords then changed all of the other website passwords that used the linked in password ?Organizations are also connecting with users on social media Because we want the real time response of customers and we want affluence to our brand ?How many followers do you have… how much do your followers trust you.Users today are afraid to trust their personal information to corporate websites to get offers ?How can you assure these users and provide an easy way for them to connect without incurring the risk ?It’s a bring your own device culture The next device on your network will have an OS version you cant predict and will execute applications your IT dept did not approve.How do you bridge the trust gap between the mobile world of random devices to provide secure digital access
  • At an organizational level its about scale – Point Solutions Don’t ScalePoint solutions that are process specific can’t scale to accommodate the needs of thousands of systems to provide the full capabilities needed for access control and enforcement. As the size of the organization increases the scale is important because we only have a handful of help desk staff and a few administrators. Adopting and deploying point solutions would create a quagmireAt a coarse grained level – we have to have access control across thousands of systems – this means onboarding – offboarding, privileged access control and certification review Accommodate 100s of Thousands of Users – In a department we are concerned with hundreds of users at an Organizational level we have to think about 100s of thousands – because Identity management is not only about internal users its also about external users as well. We are letting more outsiders inside the organization than ever before – we have to secure access to applications and data.Certify and Report on Access for Millions of Entitlements – when we think departmentally administrators focused on thousands of entitlements across single platforms – but to reach the goal we have to focus on millions of entitlements and be able to scale to manage these.
  • Today fear drives much of our purchasing and it has not made us any safer. We need to take a more strategic approach<Build>Look at security as an enabler to find new paths to business and finding new customers.Examples,Web commerce – (More customers)securing customer transactions and preventing fraud enables new opportunities for commerceMobile banking – ( More Transactions)enabling mobile applications from devices provides additional transactions and services banks can charge forPatient Care – (More patients)providing data and medical records to customers over the web increases quality and enables hospitals to serve more patientsLook for opportunities where Security spend can increase share holder value.
  • Security risk is a strategic concern for business leaders… the impact of regulatory compliance and the cost of breaches is too large to ignore. We can’t simply purchase an insurance policy against it. The stakes are too high. The criminals are after customer data At Linked in hackers stole over 6 million user accounts and passwords. This is not an isolated case. Hackers attacking corporations are not only going after their intellectual property, they are also going after their customer data. In the case of linkedin the biggest exposure is to Linkein’s online users. Because users often use the same passwords in multiple places they are now vulnerable. (http://www.nytimes.com/2012/06/11/technology/linkedin-breach-exposes-light-security-even-at-data-companies.html?pagewanted=allITS EMBARRASING IT DAMAGES THE BRAND The scale of the threat is massiveThe Sony breach highlights the volume of the threat. Instead of small breaches our breaches are no larger. The intruders are now bolder. At Sony taking 12M credit cards. These crimes cascade into more crime as fradulent charges will be made against these credit cards costing the banking industry billions to resolve.The Costs are going up Bottom line it costs a lot and the average cost is going up.. The problem is we can’t just insure against the risk anymore the stakes are too high The estimate is that cybercrime costs about 1 Trillion globally The average breach costs 7.2 Million ITS NOT A MATTER OF IF IT’S A MATTER OF WHEN
  • The threat to business is real.Decline in Brand Value At Sony the estimate is that the brand 3x its value after the breach. The biggest barrier to wide spread adoption of new services online will depend on security. http://www.securityweek.com/seven-significant-hacks-2011The cost of rebuilding confidence After the RSA breach many banks went on a spending spree to replace the tokens that were compromised after the breach. The costs are still being realized. After the RSA breach several customers like Lockheed Martin and General Dynamics were hit. SocieteGeneraleThe largest internal fraud case in history .. A rouge trader with excessive access created a 7 Billion fraud for the bank UBS 1 billion fraud – UBS already hurt by the financial crisis was hit by a billion dollar fraud that cause the resignation of the CEO.97% of it is preventable – if we focus on the risks inside. Verizon data breach report. Because once they get inside that’s where our biggest risks are.
  • While everyone is planning to support Iphone and Android smart phones .. The pace of change is much faster and we really need to plan for a further horizon. We can’t predict the devices the users will be doming in from: Today we have about 5.9 Billion devices… we can’t predict which devices users will be coming in from – Today users may decide to access email from a Samsung TV.. – One example : Toyota is building a smart car that will allow a user to manage their calendar – check email with voice only control from the car.. ( you can see the video on YouTube) they will use smart phones as the authentication. ( We are helping them build the pilot)Point : YOU WILL MOST LIKELY NOT BE ABLE TO DOWNLOAD YOUR DEVICE MANAGEMENT SOFTWARE ON THE SMART CAR.. But you have to plan for the smart car .. Today you are planning for the smart phone … tomorrow you have to plan for the smart car..5.9 Billion smart phones …. Tomorrow 6 Billion smart cars… now we really have a problem. Then Virgin Airlines will decide to add devices at each seat on the airline and we have kiosks accessing our corporate data… ( hence the plane icon on the slide )But its more than that its also the devices that are business process specific Point of sale devices – that transfer credit card info and metrics that are attached to our corporate networks Delivery vehicles – that get downloads of routes and customer data from corporate networks and drivers getting apps on mobile jib specific devices.And there are the devices we have no yet imagined that will be released soon.. NET: The scale alone makes device level security difficult and we need an approach that can give us a level of assurance that keeps up with the rate of change
  • Questions every IT security executive will have to answer 1. Mobile & Social Sign on - How does a company enable social trust as a means of connecting to customers & employees ? give example. How do I bridge the gap between my enterprise access to secure mobile devices? give exampleMost of today’s apps use brittle API calls and highly coupled architectures – while the next generation will use SOA and highly reusable architectures.5. How do I extend enterprise identity and context to mobile devices and social applications to detect fraud? give example.4. How do I accommodate dynamic workgroups and teams of people around the globe that need to be part of my value chain?5. At the same time protect the privacy of my customer data and achieve regulatory compliance.Organizations have to be able to build on the existing security foundation The next generation of applications presents an opportunity to modernize security and refocus attention on applications and data.Most of todays apps were architected as on premise in the data center – the next generation will architected for the cloud and multi-tenancyThey also produce more data than ever before and Big data and analytics will unlock the potential.
  • Here is an example
  • Mobile and Social Internet Identity Services provides relying party support for Identity Providers that support the following standards:OpenID version 2.0OpenID Simple Registration Extension 1.0Open ID Attribute Exchange Extension 1.0OpenID Provider Authentication Policy Extension 1.0.OAuth 1.0 and 2.0OOTB provideimplementationsfor:FacebookOAuth 2.0Google OpenID 2.0LinkedIn OAuth 1.0Twitter OAuth 1.0Yahoo OpenID 2.0
  • With Thousands of users – 10’s of thousands of Mobile applications – providing access is a critical part of scale. When a user comes on board we have to provision mobile access – to VPN’s etc . In addition we have to enable access to apps and data.As we bring users on we have to provision access based on rolesAs users separate we have to remove accessTo reduce the help desk cost we have to enable self service access request for end users The key to reducing administration cost is to simplify the user experience. Users can search for access semantically they way they search on AmazonAudit compliance for mobile applications will be of increasing concern – this requires visibility to user access across all devices. Fortunately our Telco customers are blazing the trail here and we are incorporating product capabilities that our corporate IT users can leverage.( If we ant to mention before R2 ) We will have an high scale XE module of OIM that will provide high scale user provisioning Directory services that provide high scale authentication and replication of application data and location data.CASE Study Oracle:Today Oracle deploys our Beehive Communicator for thousands of oracle employees. We simplify the administration by providing an internal portal page where users can configure preferences on beehive communicator. Users can use their Oracle single sign on and access data directly from Beehive and it reduces administration cost. Users can request access via Oracle APS provisioning internal portal..
  • The risks to the data center are inside,Remote access – users VPN in or SSL VPN into the data center. We have no way of knowing that the user is who they claim to be. Privilege misuse & elevated privileges - when users are given root access we have to monitor closely and safeguard privileged accounts Today stolen credentials are everywhere we have to expire accounts regularly and force password change policies When security patches are released many administrators are unaware that they patches are available – but criminals are always aware and try to exploit systems that do not update in a timely manner.
  • Data somehow wants to replicate. And hackers love that. If any of these systems are not well protected, the game is over. You need to have proper systematic protection policies and mechanisms implemented wherever your data goes.
  • Management 11g R2 www.oracle.com/OracleIDMFor data centers access to systems and applications needs to be consistent and the best way to address the need is to Safeguard privileged accounts – privileged accounts are the most powerful accounts in the data center. 5% of braches are caused by privilege misuse. Oracle Identity governance now includes a privileged account manager that can connect to many systems Tackle host access control – many systems are using local files for host access control or NIS / NIS+ - using directory server to establish centralized role based access to files and data can reduce the risks of excessive access. Oracle provides a complete access management solution for user sign on and securing access to information.
  • CSO Online Survey 2011Security is top of mind for anyone embracing cloud. Companies worry about who can see their data and they worry about how to restore the control to applications they had while apps were on premise.The top 5 security concerns all relate to data and access – in addition providing the audit assurance to address governance. The top questions being asked are .How do I provide access and fraud detection for apps off premise ? If you are a financial institution your cloud has to provide reporting to address the BASEL 2 requirements or you will and some large financial penalties. If your cloud hosts your General ledger – your cloud has to provide sarbanesoxley certification.How do organizations provide timely compliance reporting and remediation – many organizations have gone down the path of building out cloud infrastructure only to stumble on the reporting and compliance challenge. If your customers are in Europe your cloud has to comply with the European data privacy directive. At the same time everyone is worried about multi tenancy and data isolation. How do I secure data in the cloud if my data is co-mingled. And beyond this how to patch and manage the infrastructure and provide complete visibility across the stack. In other words see the cloud beyond the vapor for the infrastructure it resides on.
  • CSO Online Survey 2011Security is top of mind for anyone embracing cloud. Companies worry about who can see their data and they worry about how to restore the control to applications they had while apps were on premise.The top 5 security concerns all relate to data and access – in addition providing the audit assurance to address governance. The top questions being asked are .How do I provide access and fraud detection for apps off premise ? If you are a financial institution your cloud has to provide reporting to address the BASEL 2 requirements or you will and some large financial penalties. If your cloud hosts your General ledger – your cloud has to provide sarbanesoxley certification.How do organizations provide timely compliance reporting and remediation – many organizations have gone down the path of building out cloud infrastructure only to stumble on the reporting and compliance challenge. If your customers are in Europe your cloud has to comply with the European data privacy directive. At the same time everyone is worried about multi tenancy and data isolation. How do I secure data in the cloud if my data is co-mingled. And beyond this how to patch and manage the infrastructure and provide complete visibility across the stack. In other words see the cloud beyond the vapor for the infrastructure it resides on.
  • The endpoints will continue to change and new devices will continuously be introduced. By securing the information when it is created, accessed and stored we can better reduce the risk long term. This kind of inside-out approach to security will help you manage the risk, prevent threats and unlock the opportunities that a secure business can bring.
  • Transcript of "01 manage Risk prevent threat sun lock opportunities"

    1. 1. 1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    2. 2. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    3. 3. Gestione los Riesgos, prevenga las Amenazas y descubra las Oportunidades José Manuel Rodríguez Security Business Development Manager Oracle Ibérica 3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    4. 4. La Experiencia Digital Cloud Móvil 4 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Social
    5. 5. COMPLEJIDAD CRECIENTE • Recursos constantes 5 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    6. 6. 6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    7. 7. La Seguridad es una cuestión estratégica El número y complejidad de las amenazas externas aumenta 6M Passwords robadas Linkedin Sony SEGA 12M Tarjetas de crédito robadas 1.3M Cuentas On-line Security Week Dec 15, 2011 Seven Significant Hacks of 2011 7 BetaNews June 6, 2012 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. $1Billón Coste Global del Cibercrimen McAfee 2010 $7.2 Millones Coste medio de Fuga de Datos Ponemon 2011
    8. 8. El Riesgo amenaza el Negocio Marca, reputación, responsabilidad, valor para el accionista Sony 3x Reducción del Valor de la Marca Societe Generale $7000M Pérdidas Security Week Dec 15, 2011 Seven Significant Hacks of 2011 8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. RSA $100M Coste UBS $1000M Pérdidas. Dimisión CEO. Bloomberg June 8 2011 Verizon DBIR 2012
    9. 9. Oracle: Seguridad desde el Interior Social Social BLOG BLOG Datos 9 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Aplicaciones Usuarios
    10. 10. Oracle: Seguridad desde el Interior Social Social SEGURIDAD BASE DE DATOS Datos 10 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. GESTION DE IDENTIDADES BLOG BLOG Y ACCESOS Aplicaciones Usuarios
    11. 11. SEGURIDAD DE LAS 11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    12. 12. Sanidad Online Servicios al Ciudadano Mayor proceso de Social Transformación Retail del Negocio Servicios Cloud Banca Móvil 12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. en Movilidad Empleados CRM Social
    13. 13. 13 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    14. 14. Todo tipo de dispositivos 5900M Dispositivos hoy ~30% conectados a redes corporativas Source: Mobility Revolution Redux mar 2012 14 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    15. 15. MAS 15 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. DE LOS QUE PODEMOS
    16. 16. NUEVOS 16 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Sign-On Móvil • SEGURIDAD • Detección del Fraude • Redes Sociales • Seguridad Servicios Web
    17. 17. 10% almacenan passwords sin cifrar 58% Construyendo App stores móviles Fuente: Partnerpedia Survey Aug 2011 17 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. 50% Con dificultades en help desk debido a apps moviles Fuente: Mobility Revolution Redux Mar 2012 76% Almacenan credenciales en el dispositivo Fuente: Information week Aug 2011
    18. 18. Seguridad de Aplicaciones Móviles 18 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    19. 19. El Contexto es importante John Smith Password Seguimiento Localización Dispositivo Riesgo de Transacción Comportamiento Recursos Protegidos La credencial es válida pero ¿es realmente John Smith? ¿Hay algo sospechoso en el comportamiento de John en esta situación? ¿Puede responder a un reto si el riesgo se incrementa? 19 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    20. 20. Integración con redes sociales Selección 20 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Autenticación Autorización
    21. 21. la seguridad de aplicaciones y SSO a los dispositivos móviles. autenticación y autorización independiente del dispositivo. SIGN-ON MÓVIL 21 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. cumpliendo múltiples standards de seguridad móvil.
    22. 22. Simplificar la Administración a gran escala Aplicaciones Carro Administradores 22 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. • Acceso bajo demanda • Simplificar despliegue • Simplificar la experiencia de usuario • Reducir el riesgo en auditoría • Visibilidad óptima
    23. 23. Solucion Completa de Gestión de Identidades Provisioning Certificación de Accesos Gestión de Roles Administración delegada 23 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Análisis de Riesgo Detección Fraude Single Sign-on RESTful Sign-on Datos Usuario Datos Localización Datos Dispositivo Autenticación Centralizada
    24. 24. SEGURIDAD DEL 24 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    25. 25. • Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Robo de Credenciales • Acceso Excesivo Inyección SQL • 25 • • El Centro de Datos es vulnerable Abuso de Privilegios Mala configuracion de Seguridad
    26. 26. Los datos no están sólo en Producción Datos Sensibles Partners 26 Temp Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Reports DW/Analytics Stand By Test Dev
    27. 27. Fuentes de amenaza Los ataques pueden venir de cualquier parte Cuentas de Administracion Aplicaciones Test & Dev Operaciones 27 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. • System admin, DBA, Administrador de Aplicaciones • Credenciales robadas, uso malicioso, errores • SQL Injection • Bypass de aplicaciones • Acceso a datos de produccion en entornos no seguros • Acceso a datos en produccion para resolución de problemas • Acceso directo OS y Red • Backups perdidos/robados
    28. 28. OPERADOR DATA CENTER PARTNERS EMPLEADOS CONTRACTORS 28 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    29. 29. ÁREAS 3 DE FOCO 29 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. • Pérdida, acceso inapropiado a • en operación y administración • . Normativas de protección de datos
    30. 30. Seguridad en la Nube: control más difícil ALTO MEDIOBAJO RIESGO MEDIOALTO Cloud Pública Cloud Privada Hosted Cloud Privada In House BAJO Enterprise 1990 1995 2000 2005 2008 CONTROL ALTO 30 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. BAJO
    31. 31. • Pérdida, acceso inapropiado a PROBLEMAS • 6 PRINCIPALES en operación y administración • . Normativas de protección de datos • Convivencia con • Legislacion • Borrado de 31 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    32. 32. Seguridad Oracle para Bases de Datos PREVENCIÓN ADMINISTRACIÓN Cifrado Monitorización de Actividdad Analisis de Privilegios “Redaction” y Enmascaramiento Firewall SQL Descubrimiento de Datos Sensibles Control de Usuarios Privilegiados 32 DETECCIÓN Auditoría y Reporting Gestión de la Configuración Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    33. 33. Agenda 09.00 Registro y bienvenida 09.30 Gestione los riesgos, prevenga las amenazas y descubra las oportunidades Jose Manuel Rodríguez, Security Business Development Manager, Oracle 10:00 Seguridad en bases de datos Juan Carlos Díaz, Principal Sales Consultant, Oracle 10.45 Gestión y protección de usuarios con privilegiados Juan Carlos Díaz, Principal Sales Consultant, Oracle 11.00 Descanso 11:30 Control de acceso y movilidad David Rodríguez-Barbero, Security Presales Team Leader, Oracle 12:00 Protección de aplicaciones de negocio y servicios web David Rodríguez-Barbero, Security Presales Team Leader, Oracle 12:30 Gobierno de Identidades Juan Carlos Díaz, Principal Sales Consultant, Oracle 13:00 Servicios avanzados de Directorio David Rodríguez-Barbero, Security Presales Team Leader, Oracle 33 13.15 Cierre y conclusiones Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
    34. 34. SECURITY INSIDE OUT 34 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 11
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×