Rebuilding Corporate Trust: GRC and IT Governance. Dražen Patarić Senior Sales Consultant
|
|
|
- Elijah Cole
- 10 years ago
- Views:
Transcription
1 Rebuilding Corporate Trust: GRC and IT Governance Dražen Patarić Senior Sales Consultant
2 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decision. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle.
3 Oracle At-a-Glance Founded in Headquarters in Redwood Shores, CA with operations in 145 countries. 300,000 total customers 280,000 database customers 43,000 applications customers 80,000 FMW customers 20,000 partners 84,000 employees 20,000 developers 7,500 support staff Globally #1 Database Database Share on Linux Embedded Database Middleware CRM Retail Communications Human Capital Financial Services Banking Public Sector Professional Services Enterprise Performance Data Warehousing
4 Agenda Business Challenges Oracle s Leadership in IT Governance Solution Overview
5 Rebuilding Corporate Trust Shareholders and consumers demand more transparency, less risk What they want CONSUMERS & EMPLOYEES Protect personal information Less risk around products and services Social and environmental responsibility Source: Mckinsey, 2007 SHAREHOLDERS Increasing levels of shareholder activism Seeking advisory vote on executive pay and selection of board of directors Growing power of individual investors and hedge funds Source: Economist, 2007 A survey of global consumers shows that public trust in business leaders fell to 28% in 2006, down from 36% at the peak of corporate scandals in Source: Mckinsey, 2007 BOARD OF DIRECTORS Highlight enterprise risk as area where more visibility is needed Source: Mckinsey, 2006
6 Risky Business: Retail TJ Maxx 8 class-action lawsuits filed as of March 23; a Massachusetts-led investigation by attorneys general from 30 states; a pretax charge of $25 million spent to date. Source: 2006 Annual Report, March 2007 Chipotle Fast food chain stored full range of customer data from credit card accounts. Roughly 2,000 fraudulent charges against Chipotle customers totalled $1.3M, additional fines from Visa and Mastercard amounted to $1.7M, and legal fees racked up another $1.3M. Source: Computerworld, December 2005 Dollar Tree Customers of the discount store have reported money stolen from their bank accounts due to unauthorized ATM withdrawals. Cyber-thieves have stolen as much as $700,000 from personal accounts during the last two months. Source: Eweek, August 2006 Life is Good Boston-based retailer today disclosed a security breach in which hackers accessed a database containing 9,250 customers' credit card numbers. Source: Boston.com, Sept <Insert Picture Here>
7 Risky Business: Financial Services Bank of America, Wachovia Customer account information was illegally sold by bank employees to a business posing as a collection agency. More than 670,000 customer accounts may have been breached. Source: CNNMoney, May 2005 Citibank Mass theft of debit card PINS results in several hundred fraudulent cash withdrawals in Canada, Russia, and the U.K. This follows the loss of unencrypted tapes containing information on 3.9M customers. Source: InformationWeek, March 2006 Nationwide Building Society The U.K. s largest building society was fined 980,000 for failing to have effective systems and controls in place to manage its information security risk. Source: OpRisk & Compliance, March 2007 Capita Financial Administrators Third-party administrator of collective investment schemes was fined 300,000 for poor anti-fraud controls over client identities and accounts. The firm discovered that client names and addresses had been changed, and sale of units processed without orders from the client. Source: OpRisk & Compliance, April 2006 <Insert Picture Here>
8 Ounce of Prevention Worth a Pound of Cure Information protection less costly than breaches Cost of a Data Breach $90 Spending on Security $6 Source: Gartner, 2005 Share-price performance of companies complying with SOX rules 28% No control weaknesses in % Control weakness in 2004, but none in 2005 Reported control weakness % Source: Lord & Benoit, 2006 Savings on legal liability avoidance from GRC investment Opportunity cost of siloed GRC Savings on Lower Spending on Compliance Legal Liability $1 $5 Source: General Counsel Roundtable, 2006 Cost of GRC Ad hoc Approach Platform Approach # of GRC projects Resources for innovation
9 IT s Role in Rebuilding Corporate Trust The need for IT Governance Strategy Majority of 400 directors surveyed recognize that the right IT strategy is very important for 69% 66% 57% Compliance Customer Satisfaction Managing Risk Source: Corporate Board Member/ Deloitte Consulting, March 2007 Security The Ponemon Institute finds that 70% When a company announces a security breach, its stock price can drop by Source: Ponemon Institute, 2005 of all reported security breaches were due to insiders 2% Source: Gartner, 2005 Control Gartner warns that More than 80 per cent of IT groups may be incapable of satisfying many of the laws and regulations, such as HIPAA and 21 CFR Part 11, that require changerelated audit trails and accountability over material configuration items.
10 <Insert Picture Here> What is IT Governance? - IT Governance Institute Effective IT governance helps ensure that IT supports business goals, optimizes business investment in IT, and appropriately manages IT-related risk and opportunities.
11 IT Governance is Still Maturing IT governance discipline is in its adolescence Non-existent Ad hoc Repeatable 11% 21% 26% IT Governance is still very much associated with fulfilling control or compliance requirements. Defined Managed Optimised 4% 14% 20% CEO and CIO respondents in general reported a relatively low maturity level in comprehending IT governance in its totality. 0% 5% 10% 15% 20% 25% 30% Source: PWC, IT Governance Institute 2006
12 IT Governance in Practice Firms emphasize control and compliance 42% of IT practitioners believe that their companies lack the necessary security tools or internal controls to prevent, detect, and correct data security breaches. Source: Ponemon Institute, % of 1,000 executives polled said information technology is the most challenging area in achieving Sarbanes- Oxley 404 compliance. Source: KPMG 404 Institute, 2006 Information Protection & Privacy Configuration & Change IT GRC Lack of proper oversight for making application changes and Lack of understanding of key system configurations is among the top five IT weaknesses cited. Source: IT Service Forum, 2005
13 Oracle IT Governance Solution Cross-Enterprise Information Protection & Privacy Configuration & Change IT GRC Infrastructure Information Protection & Privacy Secures Information From the Inside Out Enterprise Configuration & Change Reduces IT System Risk IT GRC IT GRC Empowers IT to Deliver Greater Business Value
14 Agenda Business Challenges Oracle s Leadership in IT Governance Solution Overview
15 Why Choose Oracle IT Governance? Only Oracle Secures data and privacy information from the inside out Restricts even privileged users from accessing sensitive information Prevents manipulation and corruption of data and applications Centrally deploys best-practice security for applications, IT services, and infrastructure Reduces IT systems risk with configuration and change management Backs out changes and easily restore systems when necessary Identifies and correct deviations from best-practice configuration policies Simplifies system audits by limiting substantive testing with sound change management procedures IT GRC Integrates GRC management to optimize the value of IT Aligns resource skills and synchronize availability across GRC project requirements Applies service quality and performance metrics to GRC project management Implements comprehensive information management policy on a centralized platform
16 Agenda Business Challenges Oracle s Leadership in IT Governance Solution Overview
17 Oracle IT Governance Solution Cross-Enterprise Information Protection & Privacy Configuration & Change IT GRC Infrastructure Information Protection & Privacy Secures Information From the Inside Out Enterprise Configuration & Change Reduces IT System Risk IT GRC IT GRC Empowers IT to Deliver Greater Business Value
18 Oracle IT Governance Solution Cross-Enterprise Information Protection & Privacy Configuration & Change IT GRC Infrastructure Information Protection & Privacy Secures Information From the Inside Out Enterprise Configuration & Change Reduces IT System Risk IT GRC IT GRC Empowers IT to Deliver Greater Business Value
19 Oracle Information Protection & Privacy Applications E-Business Suite, PeopleSoft, Siebel, SAP, Custom, Legacy Identity Web Services Manager Access Manager Identity Federation Directory Services E-SSO Suite Identity Manager Data Security Database Vault Advanced Security Option Audit Vault Label Security Information Rights
20 Control User Access and Authorization Enforce Segregation of Duties External SOA Apps Customers Partners IT Staff Employees SOA Apps Internal Auditing and Reporting Access Directory Services Identity Administration Identity Provisioning Monitoring and Applications Systems & Repositories SCM ERP CRM OS (Unix) HR Mainframe NOS/Directories Restrict access to applications based on business policy Certify who had access to what via automated attestation Automate compliance auditing with out of the box reports
21 Secure Privileged User Access Oracle Database Vault CRITICAL DATA SUPER USER ACCESS CONTROLS National ID/SSN Time of Day Salary $ DBA 3pm Monday HR Realm IP Address HR DBA Customer Records FIN Realm Realms HR Realm FIN DBA FIN Realm Realms and command rules enable customers to easily restrict access to application data from the DBA and other powerful users Multi-factor authorization significantly increases security
22 Enforce Data Privacy Oracle Advanced Security Option Oracle Transparent Data Encryption Easily encrypt sensitive data by columns Requires no changes to applications Network Encryption Protect sensitive data as travels across network Leverage industry leading encryption algorithms Data Integrity Safeguard data from unauthorized modification Strong authentication Two Factor authorization Password PLUS Key/Dongle/Smart Card (4 standards)
23 Access Control for Distributed Content Oracle Information Rights Manager Patented distributed rights management between centralized server and desktop Centralized revocation of rights and up-todate audit trail Transparent mobile access to sealed information Classification-based rights management Enterprise-scalable
24 System Audit Consolidation & Reporting Oracle Audit Vault Lock down audit data in an audit warehouse Leverage protected schema to prevent tampering of audit data Centralize audit policy management Monitor, report, and alert on all audit activity Detect suspicious activity and auto-escalate increased auditing
25 Oracle IT Governance Solution Cross-Enterprise Information Protection & Privacy Configuration & Change IT GRC Infrastructure Information Protection & Privacy Secures Information From the Inside Out Enterprise Configuration & Change Reduces IT System Risk IT GRC IT GRC Empowers IT to Deliver Greater Business Value
26 Recipient Policy Recipient Policy Recipient Policy Enforce Proper Configurations Apply Key IT Controls with Oracle Configuration Gather Model Reconcile Enforce Audit Centrally collect and manage all system configuration information Apply database and schema definitions to create baselines Evaluate configurations and maintain set-up standards according to policies Deploy certified configurations, patches, and images across systems
27 Maintain Control Over Changes Implement Policy-Based Changes with Oracle Change Evaluate, plan for and implement changes for new applications Compare baselines with current database settings, databases with databases, and schema with schema Synchronize databases and propagate consistent changes across application systems Make policy-based changes with embedded Information Technology Infrastructure Library (ITIL) standards
28 Oracle IT Governance Solution Cross-Enterprise Information Protection & Privacy Configuration & Change IT GRC Infrastructure Information Protection & Privacy Secures Information From the Inside Out Enterprise Configuration & Change Reduces IT System Risk IT GRC IT GRC Empowers IT to Deliver Greater Business Value
29 Manage IT GRC Processes and Content Reduce Cost and Control Risk with Oracle GRC Manager Certify Sign-off and Publish Respond Remediate Retest Optimize End-to-End IT Governance Process Analyze Assess Receive Alerts Perform Self Assessment Review Reports Scope Audits Test Manual Controls Investigate Exceptions Monitor Automated Controls Centralized IT Governance Content Document - Risk-Control Matrix - COSO/COBIT Frameworks - Policies and Procedures - Evidence & Records Retention
30 Anticipate Auditor Requirements with Evidence of Enforcement IT Audit Prevent unauthorized system configuration changes with diagnostics Identify top audit alerts by application, system, and audit event Provide evidence of best-practice periodic attestation Financial Audit Deliver auditor-ready reports for process certification and remediation analysis Identify trends in control performance with snapshot comparisons Review complete audit trail for any changes to control elements
31 Align IT to the Business Oracle Project Portfolio Application Portfolio Planning Ensure application lifecycles (upgrades, enhancements, maintenance, sunset) are consistent with the IT Strategy Introduce, reuse and retire Apps according to IT governance policy Infrastructure and Technology Portfolio Planning Ensure hardware and software agendas are consistent with the Governance Strategy Services Portfolio Planning Business Services Portfolio Foundational/Technical Services Portfolio
32 Oracle IT Governance Solution Summary Information protection and privacy secures information from the inside out Restrict even privileged users from accessing sensitive information Prevent manipulation and corruption of data and applications Centrally deploy best-practice security for applications, IT services, and infrastructure Enterprise configuration and change management reduces IT systems risk Integrated GRC management empowers IT to deliver greater business value Simplify system audits by limiting substantive testing with sound change management procedures Back out changes and easily restore systems when necessary Identify and correct deviations from best-practice configuration policies Align resource skills and synchronize availability across GRC project requirements Apply service quality and performance metrics to GRC project management Implement comprehensive information management policy on a centralized platform
33 Oracle Governance, Risk, and Compliance Processes Risk & Compliance Mgmt Policy Mgmt Controls Industry Specific Applications Oracle SAP Custom Legacy Other Infrastructure Services Content Mgmt Identity Mgmt Change Mgmt Data Security Data Audit Repository Insight Risk & Control Intelligence Operational Intelligence Performance Only Oracle Delivers a Comprehensive Platform for Governance, Risk, and Compliance
34 Magic Quadrant for GRC
35 Oracle Governance, Risk, and Compliance Simplify GRC and Reduce Costs Safeguard Brand and Reputation Run Your Business Better and Prove It
36
How To Ensure Financial Compliance
Evolving from Financial Compliance to Next Generation GRC Gary Prince Principal Solution Specialist - GRC Agenda Business Challenges Oracle s Leadership in Governance, Risk and Compliance Solution Overview
<Insert Picture Here> Oracle Database Vault
Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information
Governance, Risk & Compliance for Public Sector
Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment
Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management
Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session #081163 Ana Mccollum Enterprise Management, Product Management Andy Oppenheim Enterprise Management, Product Management Mervyn Lally
An Oracle White Paper January 2010. Access Certification: Addressing & Building on a Critical Security Control
An Oracle White Paper January 2010 Access Certification: Addressing & Building on a Critical Security Control Disclaimer The following is intended to outline our general product direction. It is intended
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance
An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma Governance, Risk, Compliance (GRC) Automation Siamak Razmazma [email protected] September 2009 Agenda Introduction to
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
Complete Database Security. Thomas Kyte http://asktom.oracle.com/
Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright
"Service Lifecycle Management strategies for CIOs"
"Service Lifecycle strategies for CIOs" Ralf Hart, Sales Manager CEE Europe FrontRange Solutions 10th December 2008 Agenda FrontRange Solutions The challenges the IT community faces What is the solution?
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
Guardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
How To Manage Risk
Oracle Applications Day Zürich, 1. Juli 2009 Risk und Performance Management in Stürmischen Zeiten mit Oracle GRC Steven Hagner EMEA GRC Sales Organization 1 Safe Harbor Statement The following is intended
The Importance of IT Controls to Sarbanes-Oxley Compliance
Hosted by Deloitte, PricewaterhouseCoopers and ISACA/ITGI The Importance of IT Controls to Sarbanes-Oxley Compliance 15 December 2003 1 Presenters Chris Fox, CA Sr. Manager, Internal Audit Services PricewaterhouseCoopers
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
Attestation of Identity Information. An Oracle White Paper May 2006
Attestation of Identity Information An Oracle White Paper May 2006 Attestation of Identity Information INTRODUCTION... 3 CHALLENGES AND THE NEED FOR AUTOMATED ATTESTATION... 3 KEY FACTORS, BENEFITS AND
Oracle Database Security
Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches
Management Packs for Database
Management Packs for Database Diagnostics Pack for Database Oracle Diagnostics Pack for Database offers a complete, cost-effective, and easy to use solution for managing the performance of Oracle Database
Enterprise Content Management Suite 11g
Introducing Oracle Enterprise Content Management Suite 11g Roberto Nogueras g Senior Principal Instructor Oracle Ibérica Agenda Enterprise Content t Management (ECM)
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Dynamic Service Desk. Unified IT Management. Solution Overview
I T S E R V I C E + I T A S S E T M A N A G E M E N T INFRASTRUCTURE MANAGEMENT Dynamic Service Desk Unified IT Management Achieving business and IT alignment requires having insight into hardware and
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER
Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER Regulatory compliance. Server virtualization. IT Service Management. Business Service Management. Business Continuity planning.
Oracle Database Security. Paul Needham Senior Director, Product Management Database Security
Oracle Database Security Paul Needham Senior Director, Product Management Database Security Safe Harbor Statement The following is intended to outline our general product direction. It is intended for
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Applications Integration, Oracle Fusion Applications Nigel King, VP Fusion Applications Functional Architecture Amy Andrews, Sr. Director,
Making Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
How To Manage It Asset Management On Peoplesoft.Com
PEOPLESOFT IT ASSET MANAGEMENT KEY BENEFITS Streamline the IT Asset Lifecycle Ensure IT and Corporate Compliance Enterprise-Wide Integration Oracle s PeopleSoft IT Asset Management streamlines and automates
Oracle Fusion Applications Security Guide. 11g Release 5 (11.1.5) Part Number E16689-05
Oracle Fusion Applications Security Guide 11g Release 5 (11.1.5) Part Number E16689-05 June 2012 Oracle Fusion Applications Security Guide Part Number E16689-05 Copyright 2011-2012, Oracle and/or its affiliates.
APPLICATION COMPLIANCE AUDIT & ENFORCEMENT
TELERAN SOLUTION BRIEF Building Better Intelligence APPLICATION COMPLIANCE AUDIT & ENFORCEMENT For Exadata and Oracle 11g Data Warehouse Environments BUILDING BETTER INTELLIGENCE WITH BI/DW COMPLIANCE
<Insert Picture Here> Camilla Kampmann
Camilla Kampmann Senior Marketing Director, EE&CIS, Oracle Corporation Strong FY07 Financial Performance New Software License Revenue Maintenance Revenue Service Revenue Total Revenue
Oracle Database Security Solutions
Oracle Database Security Solutions Eric Cheung Senior Manager, Technology Sales Consulting [email protected] May 2008 Key Drivers for Data Security Privacy and Compliance Sarbanes-Oxley
ORACLE FUSION MIDDLEWARE PROFILE
ORACLE FUSION MIDDLEWARE PROFILE Corporate Addvantum, is a global service provider of Information Technology consulting and services, to customers in GCC region. Addvantum has technical delivery centers
Best Practices Report
Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general
Why Add Data Masking to Your IBM DB2 Application Environment
Why Add Data Masking to Your IBM DB2 Application Environment dataguise inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., #260 Fremont, CA 94538 (510) 824-1036 www.dataguise.com dataguise
Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach [email protected]
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach [email protected] The following is intended to outline our general product direction. It is intended for information purposes
Oracle Business Intelligence Applications: Complete Solutions for Rapid BI Success
1 Oracle Business Intelligence Applications: Complete Solutions for Rapid BI Success Lara Chedid Associate Project Manager Youssef Halawi Sales Consulting Manager Safe Harbor Statement
PEOPLESOFT IT ASSET MANAGEMENT
PEOPLESOFT IT ASSET MANAGEMENT K E Y B E N E F I T S Streamline the IT Asset Lifecycle Ensure IT and Corporate Compliance Enterprise-Wide Integration P E O P L E S O F T F I N A N C I A L M A N A G E M
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
Trust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager ([email protected]) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
BSM for IT Governance, Risk and Compliance: NERC CIP
BSM for IT Governance, Risk and Compliance: NERC CIP Addressing NERC CIP Security Program Requirements SOLUTION WHITE PAPER Table of Contents INTRODUCTION...................................................
Oracle Identity Management Securing The New Digital Experience
Oracle Identity Management Securing The New Digital Experience Security: User Single Sign-On, Certifying User Access, and Masking Sensitive Data Henry Anzarouth Principal Sales Consultant, Security and
Self-Service SOX Auditing With S3 Control
Self-Service SOX Auditing With S3 Control The Sarbanes-Oxley Act (SOX), passed by the US Congress in 2002, represents a fundamental shift in corporate governance norms. As corporations come to terms with
Secure Data Transmission Solutions for the Management and Control of Big Data
Secure Data Transmission Solutions for the Management and Control of Big Data Get the security and governance capabilities you need to solve Big Data challenges with Axway and CA Technologies. EXECUTIVE
Enterprise Database Security & Monitoring: Guardium Overview
Enterprise Database Security & Monitoring: Guardium Overview Phone: 781.487.9400 Email: [email protected] Guardium: Market-Proven Leadership Vision Enterprise platform for securing critical data across
Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan
WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data
Transformation of POS Operations at
Transformation of POS Operations at Retail Outlets for Australian Telco Abstract A leading Australian telecommunications service provider wanted to upgrade its Point of Sale (POS) operations at its retail
Enterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations
Achieving Control: The Four Critical Success Factors of Change Management Technology Concepts & Business Considerations T e c h n i c a l W H I T E P A P E R Table of Contents Executive Summary...........................................................
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues August 16, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy
Oracle Role Manager. An Oracle White Paper Updated June 2009
Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship
IBM Tivoli Asset Management for IT
Cost-effectively manage the entire life cycle of your IT assets IBM Highlights Help control the costs of IT assets with a single product installation that tracks and manages hardware, software and related
How can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
Application Control Effectiveness for SAP. December 2007
Application Control Effectiveness for SAP December 2007 Meeting Objectives Application Control Effectiveness Compliance at a glance Trends and challenges Technology issues Application Control Business
Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).
ITIL-aligned solutions White paper Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL). January 2005 2 Contents 2
Virtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
<Insert Picture Here> Charles Phillips. President Oracle Corporation
Charles Phillips President Oracle Corporation Oracle Corporation World s largest enterprise software vendor $18 billion revenue, FY07 300,000 global customers 235,000 Oracle Database
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION
ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION KEY FEATURES AND BENEFITS Manage multiple GRC initiatives on a single consolidated platform Support unique areas of operation with
1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, 2004 9:00 AM
Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance RSA Security and Accenture February 26, 2004 9:00 AM Agenda Laura Robinson, Industry Analyst, RSA Security Definition of
Addressing Cyber Security in Oracle Utilities Applications
Addressing Cyber Security in Oracle Utilities Applications Anthony Shorten Principal Product Manager Oracle Utilities Global Business Unit Sept, 2014 Safe Harbor Statement The following is intended to
IBM InfoSphere Optim Data Masking solution
IBM InfoSphere Optim Data Masking solution Mask data on demand to protect privacy across the enterprise Highlights: Safeguard personally identifiable information, trade secrets, financials and other sensitive
Business Intelligence and Service Oriented Architectures. An Oracle White Paper May 2007
Business Intelligence and Service Oriented Architectures An Oracle White Paper May 2007 Note: The following is intended to outline our general product direction. It is intended for information purposes
Real World Strategies for Migrating and Decommissioning Legacy Applications
Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of
OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii
The Office of the Auditor General has conducted a procedural review of the State Data Center (Data Center), a part of the Arizona Strategic Enterprise Technology (ASET) Division within the Arizona Department
Oracle Premier Support It s all about Customer Value
To hear the audio portion of the meeting you must dial in to: 1-866-682-4770 (US and Canada) 408-774-4073 (Int l Toll) The conference code is 0413225, and the passcode is 909090.
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
<Insert Picture Here> Cloud Computing Inside Out
Cloud Computing Inside Out Gintautas Fokas Principal Sales Consultant Agenda Short Intro to Oracle Corporation Cloud Computing in Lithuania The Market view of Cloud Computing Cloud
Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance
Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
Oracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
