SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
<Insert Picture Here>




Key Fraud and Security Considerations for
Confidence in the Cloud
January 17th 2012
Cloud Security Executive Speaker Panel


         Cloud Sourcing and Benchmarking Advisor




                Ben Trowbridge                                               GAIL COURY           Marc Boroditsky
                              CEO                                          VP Risk Management   VP I.D. Mgmt. Solutions




2   Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
                                                                                                                    2
Cloud Security Can be a Challenge. But Why?




Can Our Data Be Safe and
  Secure in the Cloud?


 3   Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
                                                                            3
Top Cloud Security Concerns*


                          1. Data access from mobile devices

                           2. Access control and I.D. Mgmt.	

                                                                                      Top 4:
                                                                                   Identity Mgmt.
                           3. On going compliance concerns                            Related

                           4. Co-mingling of customers’ data
    Co. A Data
    Co. B Data
    Co. C Data




                           5.              Security standards and certifications
                                                                                         *CSO Online Article Feb 20, 2011




4    Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
                                                                                                            4
Evaluating Your Cloud Provider’s Security
    Best Practices Cloud Sourcing Methodology

                           ??
                       Security
                                                                           •  Where does security fit within your
        Cloud Sourcing Methodology                                            overall cloud sourcing methodology?

                    Cloud
                   Provider
                   Security
                                                                           •  Best practices when evaluating a cloud
                                                                              provider’s security

                                                                           •  Cloud security pitfalls to avoid


5   Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
                                                                                                                    5
Identity Restores Control and Reduces Risk
HIGH



MED-
HIGH
                                                                                                                               Public Cloud
            RISK




                                                                                            Private Hosted Cloud
MED-
LOW




                                                                                               87%
                                                                                                                Security main barrier to
                                                               Private In House Cloud                           cloud adoption
                                                                                                                Source: IDC Enterprise Panel, 3Q09
LOW

                            Enterprise
                                                                                         CONTROL
                             HIGH                                                                                                            LOW
                       1990                               1995                    2000       2005        2008
       6   Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
                                                                                                                                                6
Identity Bridges the Gap

                                                                                                                           Adaptive Access
                                                                                                Administration             •  Context / Risk Aware
                                                                                                •  Role Mgmt               •  Anomaly detection
                                                                      Access                    •  Provisioning            •  Access certification

         Scalable Repository                                          •  Single-sign on         •  Identity Analytics
         •  Identity Synch                                            •  Password policy        •  Certification
         •  Identity Virtualization                                   •  Authorization policy                                    Risk Management
         •  Reporting                                                                                                    Audit
                                                                                                Administration
                                                                             AuthN and AuthZ
                                                Identity
                                       Tools                                Point Solutions                   Platform                  Intelligence

7   Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
                                                                                                                                                7
Case
                                                                                                                               Study
     Oracle IDM & Authentication Cloud Service

                         PeopleSoft | Internet-Facing Employee Self-Service
                   Easy for Users | Hosted and Managed by Oracle Cloud Services

                                                                                Multi-Factor Authentication
                                                                                •  What you have – your computing device
                                                                                •  What you know – password
                                                                                •  What you are – knowledge questions



Anti-Fraud Features
•  Personalized image, phrase, timestamp
•  Device fingerprint & Virtualized keyboard
•  Adaptive rules (device, location, time…)


     8   Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
                                                                                                                           8
Case
                                                                               Study
Oracle IDM & Authentication Cloud Service

          Dashboard for:
          •  Logins
          •  Failed Logins
          •  KBA Challenges
          •  Blocked Logins
          •  Alerts
          •  Drilldown
          •  and much more



9   Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
                                                                           9
Cloud Security Executive Speaker Panel


                                    Cloud Sourcing and
                                      Benchmarking
                                         Advisor

                Ben Trowbridge, CEO




              Gail Coury, VP Risk Mgmt.




             Marc Boroditsky, VP ID Mgmt.




10   Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
                                                                            10

Contenu connexe

Tendances

Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportions
OracleIDM
 
Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalGartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-final
OracleIDM
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
OracleIDM
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
OracleIDM
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
OracleIDM
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
debbanerjee
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
OracleIDM
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
vraopolisetti
 

Tendances (17)

Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportions
 
Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalGartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-final
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
 
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOA
 

En vedette

Horrible Jobs
Horrible JobsHorrible Jobs
Horrible Jobs
mkm29
 
Paisley Engaging young professionals in the agri food sector - strategies, le...
Paisley Engaging young professionals in the agri food sector - strategies, le...Paisley Engaging young professionals in the agri food sector - strategies, le...
Paisley Engaging young professionals in the agri food sector - strategies, le...
futureagricultures
 
Mortgage Backed Securities
Mortgage Backed SecuritiesMortgage Backed Securities
Mortgage Backed Securities
Clint Hammond
 
Planning sheets for final piece
Planning sheets for final piecePlanning sheets for final piece
Planning sheets for final piece
aq101824
 

En vedette (20)

Seven things to make your pup ONE in a million
Seven things to make your pup ONE in a millionSeven things to make your pup ONE in a million
Seven things to make your pup ONE in a million
 
Wayne Dunn presents to World Bank Development Marketplace on the South Africa...
Wayne Dunn presents to World Bank Development Marketplace on the South Africa...Wayne Dunn presents to World Bank Development Marketplace on the South Africa...
Wayne Dunn presents to World Bank Development Marketplace on the South Africa...
 
Horrible Jobs
Horrible JobsHorrible Jobs
Horrible Jobs
 
Marie Højhus
Marie HøjhusMarie Højhus
Marie Højhus
 
Didi
DidiDidi
Didi
 
Children’s rights
Children’s rightsChildren’s rights
Children’s rights
 
ファイナンシャル・エクストラネット
ファイナンシャル・エクストラネットファイナンシャル・エクストラネット
ファイナンシャル・エクストラネット
 
12 reasons why social media is non negotiable
12 reasons why social media is non negotiable12 reasons why social media is non negotiable
12 reasons why social media is non negotiable
 
04 03 wh_chris_walker
04 03 wh_chris_walker04 03 wh_chris_walker
04 03 wh_chris_walker
 
Paisley Engaging young professionals in the agri food sector - strategies, le...
Paisley Engaging young professionals in the agri food sector - strategies, le...Paisley Engaging young professionals in the agri food sector - strategies, le...
Paisley Engaging young professionals in the agri food sector - strategies, le...
 
Learn OpenStack from trystack.cn ——Folsom in practice
Learn OpenStack from trystack.cn  ——Folsom in practiceLearn OpenStack from trystack.cn  ——Folsom in practice
Learn OpenStack from trystack.cn ——Folsom in practice
 
Mortgage Backed Securities
Mortgage Backed SecuritiesMortgage Backed Securities
Mortgage Backed Securities
 
Planning sheets for final piece
Planning sheets for final piecePlanning sheets for final piece
Planning sheets for final piece
 
Our Services increase your business as a Brand name.
Our Services increase your business as a Brand name.Our Services increase your business as a Brand name.
Our Services increase your business as a Brand name.
 
Getting started
Getting startedGetting started
Getting started
 
Il mattino
Il mattinoIl mattino
Il mattino
 
2011 2012 annual report
2011 2012 annual report2011 2012 annual report
2011 2012 annual report
 
For (;;)
For (;;)For (;;)
For (;;)
 
Corrider annotation
Corrider annotationCorrider annotation
Corrider annotation
 
AOL_Baku_address
AOL_Baku_addressAOL_Baku_address
AOL_Baku_address
 

Similaire à Od webcast-cloud-fraud final

Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
OracleIDM
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the Cloud
Scientia Groups
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
Lenin Aboagye
 
Keynote oracle entitlement-driven idm
Keynote oracle   entitlement-driven idmKeynote oracle   entitlement-driven idm
Keynote oracle entitlement-driven idm
Normand Sauve
 
OOW 2009 EBS Security R12
OOW 2009 EBS Security R12OOW 2009 EBS Security R12
OOW 2009 EBS Security R12
jucaab
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
Amazon Web Services
 

Similaire à Od webcast-cloud-fraud final (20)

Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
Integrated Cloud Framework: Security, Governance, Compliance, Content Applica...
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy Architecture
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
 
Oracle a TBIZ2011
Oracle a TBIZ2011Oracle a TBIZ2011
Oracle a TBIZ2011
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the Cloud
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
Enterprise Security in Cloud
Enterprise Security in CloudEnterprise Security in Cloud
Enterprise Security in Cloud
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
 
Antivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizadosAntivirus específicos para entornos virtualizados
Antivirus específicos para entornos virtualizados
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
Keynote oracle entitlement-driven idm
Keynote oracle   entitlement-driven idmKeynote oracle   entitlement-driven idm
Keynote oracle entitlement-driven idm
 
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
 
OOW 2009 EBS Security R12
OOW 2009 EBS Security R12OOW 2009 EBS Security R12
OOW 2009 EBS Security R12
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 

Plus de OracleIDM

Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
OracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
OracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 

Plus de OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Od webcast-cloud-fraud final

  • 1. <Insert Picture Here> Key Fraud and Security Considerations for Confidence in the Cloud January 17th 2012
  • 2. Cloud Security Executive Speaker Panel Cloud Sourcing and Benchmarking Advisor Ben Trowbridge GAIL COURY Marc Boroditsky CEO VP Risk Management VP I.D. Mgmt. Solutions 2 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 2
  • 3. Cloud Security Can be a Challenge. But Why? Can Our Data Be Safe and Secure in the Cloud? 3 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 3
  • 4. Top Cloud Security Concerns* 1. Data access from mobile devices 2. Access control and I.D. Mgmt. Top 4: Identity Mgmt. 3. On going compliance concerns Related 4. Co-mingling of customers’ data Co. A Data Co. B Data Co. C Data 5. Security standards and certifications *CSO Online Article Feb 20, 2011 4 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 4
  • 5. Evaluating Your Cloud Provider’s Security Best Practices Cloud Sourcing Methodology ?? Security •  Where does security fit within your Cloud Sourcing Methodology overall cloud sourcing methodology? Cloud Provider Security •  Best practices when evaluating a cloud provider’s security •  Cloud security pitfalls to avoid 5 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 5
  • 6. Identity Restores Control and Reduces Risk HIGH MED- HIGH Public Cloud RISK Private Hosted Cloud MED- LOW 87% Security main barrier to Private In House Cloud cloud adoption Source: IDC Enterprise Panel, 3Q09 LOW Enterprise CONTROL HIGH LOW 1990 1995 2000 2005 2008 6 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 6
  • 7. Identity Bridges the Gap Adaptive Access Administration •  Context / Risk Aware •  Role Mgmt •  Anomaly detection Access •  Provisioning •  Access certification Scalable Repository •  Single-sign on •  Identity Analytics •  Identity Synch •  Password policy •  Certification •  Identity Virtualization •  Authorization policy Risk Management •  Reporting Audit Administration AuthN and AuthZ Identity Tools Point Solutions Platform Intelligence 7 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 7
  • 8. Case Study Oracle IDM & Authentication Cloud Service PeopleSoft | Internet-Facing Employee Self-Service Easy for Users | Hosted and Managed by Oracle Cloud Services Multi-Factor Authentication •  What you have – your computing device •  What you know – password •  What you are – knowledge questions Anti-Fraud Features •  Personalized image, phrase, timestamp •  Device fingerprint & Virtualized keyboard •  Adaptive rules (device, location, time…) 8 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 8
  • 9. Case Study Oracle IDM & Authentication Cloud Service Dashboard for: •  Logins •  Failed Logins •  KBA Challenges •  Blocked Logins •  Alerts •  Drilldown •  and much more 9 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 9
  • 10. Cloud Security Executive Speaker Panel Cloud Sourcing and Benchmarking Advisor Ben Trowbridge, CEO Gail Coury, VP Risk Mgmt. Marc Boroditsky, VP ID Mgmt. 10 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 10