Rebuilding Corporate Trust: GRC and IT Governance. Dražen Patarić Senior Sales Consultant



Similar documents
How To Ensure Financial Compliance

<Insert Picture Here> Oracle Database Vault

Governance, Risk & Compliance for Public Sector

Enabling ITIL Best Practices Through Oracle Enterprise Manager, Session # Ana Mccollum Enterprise Management, Product Management

An Oracle White Paper January Access Certification: Addressing & Building on a Critical Security Control

<Insert Picture Here> Oracle Database Security Overview

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma

<Insert Picture Here> Oracle Identity And Access Management

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Complete Database Security. Thomas Kyte

"Service Lifecycle Management strategies for CIOs"

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Guardium Change Auditing System (CAS)

MySQL Security: Best Practices

How To Manage Risk

The Importance of IT Controls to Sarbanes-Oxley Compliance

The Value of Vulnerability Management*

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Attestation of Identity Information. An Oracle White Paper May 2006

Oracle Database Security

Management Packs for Database

Enterprise Content Management Suite 11g

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Governance, Risk, and Compliance (GRC) White Paper

Dynamic Service Desk. Unified IT Management. Solution Overview

How To Achieve Pca Compliance With Redhat Enterprise Linux

Securing Data in Oracle Database 12c

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

Preemptive security solutions for healthcare

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

Making Database Security an IT Security Priority

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

How To Manage It Asset Management On Peoplesoft.Com

Oracle Fusion Applications Security Guide. 11g Release 5 (11.1.5) Part Number E

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

<Insert Picture Here> Camilla Kampmann

Oracle Database Security Solutions

ORACLE FUSION MIDDLEWARE PROFILE

Best Practices Report

Why Add Data Masking to Your IBM DB2 Application Environment

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Oracle Business Intelligence Applications: Complete Solutions for Rapid BI Success

PEOPLESOFT IT ASSET MANAGEMENT

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Trust but Verify: Best Practices for Monitoring Privileged Users

BSM for IT Governance, Risk and Compliance: NERC CIP

Oracle Identity Management Securing The New Digital Experience

Self-Service SOX Auditing With S3 Control

Secure Data Transmission Solutions for the Management and Control of Big Data

Enterprise Database Security & Monitoring: Guardium Overview

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Transformation of POS Operations at

Enterprise Identity Management Reference Architecture

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Oracle Role Manager. An Oracle White Paper Updated June 2009

IBM Tivoli Asset Management for IT

How can Identity and Access Management help me to improve compliance and drive business performance?

Application Control Effectiveness for SAP. December 2007

Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).

Virtualization Impact on Compliance and Audit

Exhibit to Data Center Services Service Component Provider Master Services Agreement

<Insert Picture Here> Charles Phillips. President Oracle Corporation

Privilege Gone Wild: The State of Privileged Account Management in 2015

Strengthen security with intelligent identity and access management

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

ORACLE ENTERPRISE GOVERNANCE, RISK, AND COMPLIANCE MANAGER FUSION EDITION

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

Addressing Cyber Security in Oracle Utilities Applications

IBM InfoSphere Optim Data Masking solution

Business Intelligence and Service Oriented Architectures. An Oracle White Paper May 2007

Real World Strategies for Migrating and Decommissioning Legacy Applications

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

Oracle Premier Support It s all about Customer Value

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

<Insert Picture Here> Cloud Computing Inside Out

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

Oracle Reference Architecture and Oracle Cloud

Transcription:

Rebuilding Corporate Trust: GRC and IT Governance Dražen Patarić Senior Sales Consultant

Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decision. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle.

Oracle At-a-Glance Founded in 1977. Headquarters in Redwood Shores, CA with operations in 145 countries. 300,000 total customers 280,000 database customers 43,000 applications customers 80,000 FMW customers 20,000 partners 84,000 employees 20,000 developers 7,500 support staff Globally #1 Database Database Share on Linux Embedded Database Middleware CRM Retail Communications Human Capital Financial Services Banking Public Sector Professional Services Enterprise Performance Data Warehousing

Agenda Business Challenges Oracle s Leadership in IT Governance Solution Overview

Rebuilding Corporate Trust Shareholders and consumers demand more transparency, less risk What they want CONSUMERS & EMPLOYEES Protect personal information Less risk around products and services Social and environmental responsibility Source: Mckinsey, 2007 SHAREHOLDERS Increasing levels of shareholder activism Seeking advisory vote on executive pay and selection of board of directors Growing power of individual investors and hedge funds Source: Economist, 2007 A survey of global consumers shows that public trust in business leaders fell to 28% in 2006, down from 36% at the peak of corporate scandals in 2002. Source: Mckinsey, 2007 BOARD OF DIRECTORS Highlight enterprise risk as area where more visibility is needed Source: Mckinsey, 2006

Risky Business: Retail TJ Maxx 8 class-action lawsuits filed as of March 23; a Massachusetts-led investigation by attorneys general from 30 states; a pretax charge of $25 million spent to date. Source: 2006 Annual Report, March 2007 Chipotle Fast food chain stored full range of customer data from credit card accounts. Roughly 2,000 fraudulent charges against Chipotle customers totalled $1.3M, additional fines from Visa and Mastercard amounted to $1.7M, and legal fees racked up another $1.3M. Source: Computerworld, December 2005 Dollar Tree Customers of the discount store have reported money stolen from their bank accounts due to unauthorized ATM withdrawals. Cyber-thieves have stolen as much as $700,000 from personal accounts during the last two months. Source: Eweek, August 2006 Life is Good Boston-based retailer today disclosed a security breach in which hackers accessed a database containing 9,250 customers' credit card numbers. Source: Boston.com, Sept. 2006 <Insert Picture Here>

Risky Business: Financial Services Bank of America, Wachovia Customer account information was illegally sold by bank employees to a business posing as a collection agency. More than 670,000 customer accounts may have been breached. Source: CNNMoney, May 2005 Citibank Mass theft of debit card PINS results in several hundred fraudulent cash withdrawals in Canada, Russia, and the U.K. This follows the loss of unencrypted tapes containing information on 3.9M customers. Source: InformationWeek, March 2006 Nationwide Building Society The U.K. s largest building society was fined 980,000 for failing to have effective systems and controls in place to manage its information security risk. Source: OpRisk & Compliance, March 2007 Capita Financial Administrators Third-party administrator of collective investment schemes was fined 300,000 for poor anti-fraud controls over client identities and accounts. The firm discovered that client names and addresses had been changed, and sale of units processed without orders from the client. Source: OpRisk & Compliance, April 2006 <Insert Picture Here>

Ounce of Prevention Worth a Pound of Cure Information protection less costly than breaches Cost of a Data Breach $90 Spending on Security $6 Source: Gartner, 2005 Share-price performance of companies complying with SOX rules 28% No control weaknesses in 2004-05 26% Control weakness in 2004, but none in 2005 Reported control weakness 2004-05 6% Source: Lord & Benoit, 2006 Savings on legal liability avoidance from GRC investment Opportunity cost of siloed GRC Savings on Lower Spending on Compliance Legal Liability $1 $5 Source: General Counsel Roundtable, 2006 Cost of GRC Ad hoc Approach Platform Approach # of GRC projects Resources for innovation

IT s Role in Rebuilding Corporate Trust The need for IT Governance Strategy Majority of 400 directors surveyed recognize that the right IT strategy is very important for 69% 66% 57% Compliance Customer Satisfaction Managing Risk Source: Corporate Board Member/ Deloitte Consulting, March 2007 Security The Ponemon Institute finds that 70% When a company announces a security breach, its stock price can drop by Source: Ponemon Institute, 2005 of all reported security breaches were due to insiders 2% Source: Gartner, 2005 Control Gartner warns that More than 80 per cent of IT groups may be incapable of satisfying many of the laws and regulations, such as HIPAA and 21 CFR Part 11, that require changerelated audit trails and accountability over material configuration items.

<Insert Picture Here> What is IT Governance? - IT Governance Institute Effective IT governance helps ensure that IT supports business goals, optimizes business investment in IT, and appropriately manages IT-related risk and opportunities.

IT Governance is Still Maturing IT governance discipline is in its adolescence Non-existent Ad hoc Repeatable 11% 21% 26% IT Governance is still very much associated with fulfilling control or compliance requirements. Defined Managed Optimised 4% 14% 20% CEO and CIO respondents in general reported a relatively low maturity level in comprehending IT governance in its totality. 0% 5% 10% 15% 20% 25% 30% Source: PWC, IT Governance Institute 2006

IT Governance in Practice Firms emphasize control and compliance 42% of IT practitioners believe that their companies lack the necessary security tools or internal controls to prevent, detect, and correct data security breaches. Source: Ponemon Institute, 2007 50% of 1,000 executives polled said information technology is the most challenging area in achieving Sarbanes- Oxley 404 compliance. Source: KPMG 404 Institute, 2006 Information Protection & Privacy Configuration & Change IT GRC Lack of proper oversight for making application changes and Lack of understanding of key system configurations is among the top five IT weaknesses cited. Source: IT Service Forum, 2005

Oracle IT Governance Solution Cross-Enterprise Information Protection & Privacy Configuration & Change IT GRC Infrastructure Information Protection & Privacy Secures Information From the Inside Out Enterprise Configuration & Change Reduces IT System Risk IT GRC IT GRC Empowers IT to Deliver Greater Business Value

Agenda Business Challenges Oracle s Leadership in IT Governance Solution Overview

Why Choose Oracle IT Governance? Only Oracle Secures data and privacy information from the inside out Restricts even privileged users from accessing sensitive information Prevents manipulation and corruption of data and applications Centrally deploys best-practice security for applications, IT services, and infrastructure Reduces IT systems risk with configuration and change management Backs out changes and easily restore systems when necessary Identifies and correct deviations from best-practice configuration policies Simplifies system audits by limiting substantive testing with sound change management procedures IT GRC Integrates GRC management to optimize the value of IT Aligns resource skills and synchronize availability across GRC project requirements Applies service quality and performance metrics to GRC project management Implements comprehensive information management policy on a centralized platform

Agenda Business Challenges Oracle s Leadership in IT Governance Solution Overview

Oracle IT Governance Solution Cross-Enterprise Information Protection & Privacy Configuration & Change IT GRC Infrastructure Information Protection & Privacy Secures Information From the Inside Out Enterprise Configuration & Change Reduces IT System Risk IT GRC IT GRC Empowers IT to Deliver Greater Business Value

Oracle IT Governance Solution Cross-Enterprise Information Protection & Privacy Configuration & Change IT GRC Infrastructure Information Protection & Privacy Secures Information From the Inside Out Enterprise Configuration & Change Reduces IT System Risk IT GRC IT GRC Empowers IT to Deliver Greater Business Value

Oracle Information Protection & Privacy Applications E-Business Suite, PeopleSoft, Siebel, SAP, Custom, Legacy Identity Web Services Manager Access Manager Identity Federation Directory Services E-SSO Suite Identity Manager Data Security Database Vault Advanced Security Option Audit Vault Label Security Information Rights

Control User Access and Authorization Enforce Segregation of Duties External SOA Apps Customers Partners IT Staff Employees SOA Apps Internal Auditing and Reporting Access Directory Services Identity Administration Identity Provisioning Monitoring and Applications Systems & Repositories SCM ERP CRM OS (Unix) HR Mainframe NOS/Directories Restrict access to applications based on business policy Certify who had access to what via automated attestation Automate compliance auditing with out of the box reports

Secure Privileged User Access Oracle Database Vault CRITICAL DATA SUPER USER ACCESS CONTROLS National ID/SSN 782-03 03-02750275 Time of Day Salary $ DBA 3pm Monday HR Realm IP Address HR DBA Customer Records FIN Realm Realms HR Realm FIN DBA FIN Realm Realms and command rules enable customers to easily restrict access to application data from the DBA and other powerful users Multi-factor authorization significantly increases security

Enforce Data Privacy Oracle Advanced Security Option Oracle Transparent Data Encryption Easily encrypt sensitive data by columns Requires no changes to applications Network Encryption Protect sensitive data as travels across network Leverage industry leading encryption algorithms Data Integrity Safeguard data from unauthorized modification Strong authentication Two Factor authorization Password PLUS Key/Dongle/Smart Card (4 standards)

Access Control for Distributed Content Oracle Information Rights Manager Patented distributed rights management between centralized server and desktop Centralized revocation of rights and up-todate audit trail Transparent mobile access to sealed information Classification-based rights management Enterprise-scalable

System Audit Consolidation & Reporting Oracle Audit Vault Lock down audit data in an audit warehouse Leverage protected schema to prevent tampering of audit data Centralize audit policy management Monitor, report, and alert on all audit activity Detect suspicious activity and auto-escalate increased auditing

Oracle IT Governance Solution Cross-Enterprise Information Protection & Privacy Configuration & Change IT GRC Infrastructure Information Protection & Privacy Secures Information From the Inside Out Enterprise Configuration & Change Reduces IT System Risk IT GRC IT GRC Empowers IT to Deliver Greater Business Value

Recipient Policy Recipient Policy Recipient Policy Enforce Proper Configurations Apply Key IT Controls with Oracle Configuration Gather Model Reconcile Enforce Audit Centrally collect and manage all system configuration information Apply database and schema definitions to create baselines Evaluate configurations and maintain set-up standards according to policies Deploy certified configurations, patches, and images across systems

Maintain Control Over Changes Implement Policy-Based Changes with Oracle Change Evaluate, plan for and implement changes for new applications Compare baselines with current database settings, databases with databases, and schema with schema Synchronize databases and propagate consistent changes across application systems Make policy-based changes with embedded Information Technology Infrastructure Library (ITIL) standards

Oracle IT Governance Solution Cross-Enterprise Information Protection & Privacy Configuration & Change IT GRC Infrastructure Information Protection & Privacy Secures Information From the Inside Out Enterprise Configuration & Change Reduces IT System Risk IT GRC IT GRC Empowers IT to Deliver Greater Business Value

Manage IT GRC Processes and Content Reduce Cost and Control Risk with Oracle GRC Manager Certify Sign-off and Publish Respond Remediate Retest Optimize End-to-End IT Governance Process Analyze Assess Receive Alerts Perform Self Assessment Review Reports Scope Audits Test Manual Controls Investigate Exceptions Monitor Automated Controls Centralized IT Governance Content Document - Risk-Control Matrix - COSO/COBIT Frameworks - Policies and Procedures - Evidence & Records Retention

Anticipate Auditor Requirements with Evidence of Enforcement IT Audit Prevent unauthorized system configuration changes with diagnostics Identify top audit alerts by application, system, and audit event Provide evidence of best-practice periodic attestation Financial Audit Deliver auditor-ready reports for process certification and remediation analysis Identify trends in control performance with snapshot comparisons Review complete audit trail for any changes to control elements

Align IT to the Business Oracle Project Portfolio Application Portfolio Planning Ensure application lifecycles (upgrades, enhancements, maintenance, sunset) are consistent with the IT Strategy Introduce, reuse and retire Apps according to IT governance policy Infrastructure and Technology Portfolio Planning Ensure hardware and software agendas are consistent with the Governance Strategy Services Portfolio Planning Business Services Portfolio Foundational/Technical Services Portfolio

Oracle IT Governance Solution Summary Information protection and privacy secures information from the inside out Restrict even privileged users from accessing sensitive information Prevent manipulation and corruption of data and applications Centrally deploy best-practice security for applications, IT services, and infrastructure Enterprise configuration and change management reduces IT systems risk Integrated GRC management empowers IT to deliver greater business value Simplify system audits by limiting substantive testing with sound change management procedures Back out changes and easily restore systems when necessary Identify and correct deviations from best-practice configuration policies Align resource skills and synchronize availability across GRC project requirements Apply service quality and performance metrics to GRC project management Implement comprehensive information management policy on a centralized platform

Oracle Governance, Risk, and Compliance Processes Risk & Compliance Mgmt Policy Mgmt Controls Industry Specific Applications Oracle SAP Custom Legacy Other Infrastructure Services Content Mgmt Identity Mgmt Change Mgmt Data Security Data Audit Repository Insight Risk & Control Intelligence Operational Intelligence Performance Only Oracle Delivers a Comprehensive Platform for Governance, Risk, and Compliance

Magic Quadrant for GRC

Oracle Governance, Risk, and Compliance Simplify GRC and Reduce Costs Safeguard Brand and Reputation Run Your Business Better and Prove It