SlideShare a Scribd company logo
1 of 18
A Pragmatic Approach to a Secure 
Information Environment 
David Knox 
VP Technology 
Oracle National Security Group
Three Things to Think About 
Security Drivers & Governance 
Protecting Our Systems 
Cutting-edge Innovations 
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 
1 
2 
3 
2
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
“A” is for Assets 
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
“B” is for Brand 
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
NIST FIPS 140-1 & 201 
OFAC 
21CFR Part 11 CA SB 1386 
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 
Sarbanes-Oxley 
FTC 16 CFR 314 
Patriot Act 
PCAOB Audit 
WA SB 6043 
ND SB 2251 
IL SB 1479 
PA SB 705 
PIPEDA 
HSPD-12 
FERPA FISMA PL107-347 
EU Privacy 
GLB 
Basel II 
BSA 
HIPAA 
Compliance
Getting a Handle on Compliance 
Ensuring Reality is in line with Theory 
Discover Classify Assess Monitor 
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 
• Automated Asset Discovery and Grouping 
• Patch Management 
• Configuration Controls 
• Enterprise Compliance 
• Continuous Monitoring 
Monitor 
Configuration 
Management 
& Audit 
Vulnerability 
Management 
Fix 
Analysis & 
Analytics 
Prioritize 
Policy 
Management 
Asset 
Management
Three Things to Think About 
Security Drivers & Governance 
Protecting Our Systems 
Cutting-edge Innovations 
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 
1 
2 
8 
3
• Mitigating Insider Threats requires 
mandatory controls and auditing 
• Cloud (Administrators) introduce new 
risks 
• Persistent threats from Cyber attacks is 
the new normal 
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 
9 
Leverage Protections for the Cyber, Insider Threats & Cloud
Network 
uthenticate 
KING 18031 
SCOTT 14220 
PIERMAR 17170 
KNOX 12029 
KYTE 17045 
CAREY 12032 
HOECHST 18029 
Org 30 
Authentication Access 
sfING 
SCOjd 
ByAgE 
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 
Data 
Protection in Context 
Privacy & 
integrity of 
data 
Monitoring & 
auditing 
Privacy & 
integrity of 
communications 
control 
SMITH 
gAMES 
fONES 
MIER 
Org 10 
Org 20 
Admin
Three Things to Think About 
Security Drivers & Governance 
Protecting Our Systems 
Cutting-edge Innovations 
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 
1 
3 
11 
2
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 
Continuous Monitoring 
High Ingest with Query 
• Approaching 200,000 EPS; 3 Billon (4TB) rows/day 
• From 12 users to > 100; Query response 70X faster 
– Most queries sub-second, longest query < 60 seconds 
• 14 Days of data retained expanded to 5 years 
– Enabled new queries which give needed insight 
• Data Compression 14X 
• 7:1 Reduction in Floor Space: Cost Savings 10X
Innovations in Infrastructure Create New Capabilities 
Software 
in Silicon 
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 
Performance 
In-Memory Acceleration 
Engines 
Reliability & 
Security 
Application Data 
Integrity 
Capacity 
Encryption & 
Compression 
Engines
Reliability & Security: Application Data Integrity 
Revolutionary Change to Memory Architecture 
• Database In-memory places terabytes of data in memory 
– More vulnerable to corruption by bugs/attacks than storage 
• SPARC M7 Application Data Protection stops memory 
corruptions with no impact on performance 
• Hidden “color” bits added to pointers (key), and content (lock) 
• Pointer color (key) must match content color or program is aborted 
• Prevents access off end of structure, stale pointer access, 
malicious attacks, etc. plus improves developer productivity Memory 
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 
Pointers 
Memory 
Content
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 
Concluding Points 
• Security in-depth with practical governance 
– Security is more than authentication and firewalls 
– Apply proven, natural and intuitive practices 
• Protection techniques mitigate all risks 
– Cloud 
– Cyber 
– Insider threats 
• Innovations in technology, innovations in thinking
Safe Harbor Statement 
The preceding is intended to outline our general product direction. It is intended for 
information purposes only, and may not be incorporated into any contract. It is not a 
commitment to deliver any material, code, or functionality, and should not be relied upon 
in making purchasing decisions. The development, release, and timing of any features or 
functionality described for Oracle’s products remains at the sole discretion of Oracle. 
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 
16
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 17
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Changing Environment?

More Related Content

What's hot

Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkAchieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Kevin Fealey
 

What's hot (20)

How to Comply with NIST 800-171
How to Comply with NIST 800-171How to Comply with NIST 800-171
How to Comply with NIST 800-171
 
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and SubcontractorsFull Cybersecurity Regulations Overview for DoD Prime and Subcontractors
Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors
 
Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable Government Webinar: Preparing for CMMC Compliance Roundtable
Government Webinar: Preparing for CMMC Compliance Roundtable
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
It and-cyber-module-2
It and-cyber-module-2It and-cyber-module-2
It and-cyber-module-2
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...
Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...
Collaborative Threat Mitigation or (Collective Self Defense) by Scott Pinkert...
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
Leveraging Purchase Power and Standards to Improve Security in the IT Supply ...
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkAchieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
 
The RIPE Experience
The RIPE ExperienceThe RIPE Experience
The RIPE Experience
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 

Viewers also liked

Security environment
Security environmentSecurity environment
Security environment
Jay Choudhary
 
The Evolving Security Environment For Web Services
The Evolving Security Environment For Web ServicesThe Evolving Security Environment For Web Services
The Evolving Security Environment For Web Services
Qanita Ahmad
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
m8817
 
A project report on e business
A project report on e businessA project report on e business
A project report on e business
Verma Pramod
 

Viewers also liked (9)

Network Security in a Virtualized Environment
Network Security in a Virtualized EnvironmentNetwork Security in a Virtualized Environment
Network Security in a Virtualized Environment
 
Security environment
Security environmentSecurity environment
Security environment
 
The Evolving Security Environment For Web Services
The Evolving Security Environment For Web ServicesThe Evolving Security Environment For Web Services
The Evolving Security Environment For Web Services
 
Brian Usher: The Evolving Threats: A Local Government Perspective
Brian Usher: The Evolving Threats: A Local Government PerspectiveBrian Usher: The Evolving Threats: A Local Government Perspective
Brian Usher: The Evolving Threats: A Local Government Perspective
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Risk management in e banking
Risk management in e bankingRisk management in e banking
Risk management in e banking
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
A project report on e business
A project report on e businessA project report on e business
A project report on e business
 

Similar to David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Changing Environment?

Oracle Sparc Cloud
Oracle Sparc CloudOracle Sparc Cloud
Oracle Sparc Cloud
Ernest Jones
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
MongoDB
 

Similar to David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Changing Environment? (20)

Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
Oracle Sparc Cloud
Oracle Sparc CloudOracle Sparc Cloud
Oracle Sparc Cloud
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Securing data in Oracle Database 12c - 2015
Securing data in Oracle Database 12c - 2015Securing data in Oracle Database 12c - 2015
Securing data in Oracle Database 12c - 2015
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 
Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security Products
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
 
Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Managing SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk EnterpriseManaging SCADA Operations and Security with Splunk Enterprise
Managing SCADA Operations and Security with Splunk Enterprise
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 

More from Government Technology and Services Coalition

GTSC June 2013 - November 2014 Annual Report
GTSC June 2013 - November 2014 Annual ReportGTSC June 2013 - November 2014 Annual Report
GTSC June 2013 - November 2014 Annual Report
Government Technology and Services Coalition
 

More from Government Technology and Services Coalition (20)

GTSC 5th Anniversary Annual Report: Steady in a Sea of Change
GTSC 5th Anniversary Annual Report:  Steady in a Sea of ChangeGTSC 5th Anniversary Annual Report:  Steady in a Sea of Change
GTSC 5th Anniversary Annual Report: Steady in a Sea of Change
 
Government Technology & Services Coalition 2015 Annual Report
Government Technology & Services Coalition 2015 Annual ReportGovernment Technology & Services Coalition 2015 Annual Report
Government Technology & Services Coalition 2015 Annual Report
 
Robert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government ContractorsRobert Nichols: Cybersecurity for Government Contractors
Robert Nichols: Cybersecurity for Government Contractors
 
GTSC Annual Meeting 2014: Michelle Mrdeza: What to Expect When You Are Expect...
GTSC Annual Meeting 2014: Michelle Mrdeza: What to Expect When You Are Expect...GTSC Annual Meeting 2014: Michelle Mrdeza: What to Expect When You Are Expect...
GTSC Annual Meeting 2014: Michelle Mrdeza: What to Expect When You Are Expect...
 
GTSC Annual Meeting 2014: Chani Wiggins: 114th Congress: Big Picture
GTSC Annual Meeting 2014: Chani Wiggins: 114th Congress: Big PictureGTSC Annual Meeting 2014: Chani Wiggins: 114th Congress: Big Picture
GTSC Annual Meeting 2014: Chani Wiggins: 114th Congress: Big Picture
 
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
GTSC Annual Meeting 2014: Justin Chiarodo: Ethics & Compliance: Suspension an...
 
GTSC Annual Meeting 2014: BD Exchange
GTSC Annual Meeting 2014: BD ExchangeGTSC Annual Meeting 2014: BD Exchange
GTSC Annual Meeting 2014: BD Exchange
 
GTSC June 2013 - November 2014 Annual Report
GTSC June 2013 - November 2014 Annual ReportGTSC June 2013 - November 2014 Annual Report
GTSC June 2013 - November 2014 Annual Report
 
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber SurveyKristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
Kristina Tanasichuk: Presentation of GTSC/InfraGard Cyber Survey
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Antwayne Johnson: Alert/Notification Technologies: The Integrated Public Aler...
Antwayne Johnson: Alert/Notification Technologies: The Integrated Public Aler...Antwayne Johnson: Alert/Notification Technologies: The Integrated Public Aler...
Antwayne Johnson: Alert/Notification Technologies: The Integrated Public Aler...
 
Justin Chiarodo: Government Contracts & Insurance Issues: How Prepared is You...
Justin Chiarodo: Government Contracts & Insurance Issues: How Prepared is You...Justin Chiarodo: Government Contracts & Insurance Issues: How Prepared is You...
Justin Chiarodo: Government Contracts & Insurance Issues: How Prepared is You...
 
Todd Jasper: How Can We Leverage Technology to Improve Performance: Social Me...
Todd Jasper: How Can We Leverage Technology to Improve Performance: Social Me...Todd Jasper: How Can We Leverage Technology to Improve Performance: Social Me...
Todd Jasper: How Can We Leverage Technology to Improve Performance: Social Me...
 
Kevin Delin: How Can We Leverage Technology to Improve Performance: The Senso...
Kevin Delin: How Can We Leverage Technology to Improve Performance: The Senso...Kevin Delin: How Can We Leverage Technology to Improve Performance: The Senso...
Kevin Delin: How Can We Leverage Technology to Improve Performance: The Senso...
 
Brian Lepore: The Evolving Threats: GAO's Report on DOD's Infrastructure Adap...
Brian Lepore: The Evolving Threats: GAO's Report on DOD's Infrastructure Adap...Brian Lepore: The Evolving Threats: GAO's Report on DOD's Infrastructure Adap...
Brian Lepore: The Evolving Threats: GAO's Report on DOD's Infrastructure Adap...
 
David Kaufman: FEMA's Preparedness: A Leading, Agile, Focused Agency
David Kaufman: FEMA's Preparedness: A Leading, Agile, Focused AgencyDavid Kaufman: FEMA's Preparedness: A Leading, Agile, Focused Agency
David Kaufman: FEMA's Preparedness: A Leading, Agile, Focused Agency
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
Homeland Security: Understanding Funding and Spending
Homeland Security:  Understanding Funding and SpendingHomeland Security:  Understanding Funding and Spending
Homeland Security: Understanding Funding and Spending
 
Homeland Security Funding 2013
Homeland Security Funding 2013Homeland Security Funding 2013
Homeland Security Funding 2013
 
The Cyber Threat Landscape
The Cyber Threat LandscapeThe Cyber Threat Landscape
The Cyber Threat Landscape
 

Recently uploaded

Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 

Recently uploaded (20)

Finance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCCFinance strategies for adaptation. Presentation for CANCC
Finance strategies for adaptation. Presentation for CANCC
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
 
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
TEST BANK For Essentials of Negotiation, 7th Edition by Roy Lewicki, Bruce Ba...
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 
CBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related TopicsCBO’s Recent Appeals for New Research on Health-Related Topics
CBO’s Recent Appeals for New Research on Health-Related Topics
 
The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)The U.S. Budget and Economic Outlook (Presentation)
The U.S. Budget and Economic Outlook (Presentation)
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
Russian🍌Dazzling Hottie Get☎️ 9053900678 ☎️call girl In Chandigarh By Chandig...
 
A Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental CrisisA Press for the Planet: Journalism in the face of the Environmental Crisis
A Press for the Planet: Journalism in the face of the Environmental Crisis
 
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
WORLD DEVELOPMENT REPORT 2024 - Economic Growth in Middle-Income Countries.
 
Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024Regional Snapshot Atlanta Aging Trends 2024
Regional Snapshot Atlanta Aging Trends 2024
 
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation -  Humble BeginningsZechariah Boodey Farmstead Collaborative presentation -  Humble Beginnings
Zechariah Boodey Farmstead Collaborative presentation - Humble Beginnings
 
An Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCCAn Atoll Futures Research Institute? Presentation for CANCC
An Atoll Futures Research Institute? Presentation for CANCC
 
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
 
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
VIP Model Call Girls Narhe ( Pune ) Call ON 8005736733 Starting From 5K to 25...
 
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Bhosari ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 

David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Changing Environment?

  • 1. A Pragmatic Approach to a Secure Information Environment David Knox VP Technology Oracle National Security Group
  • 2. Three Things to Think About Security Drivers & Governance Protecting Our Systems Cutting-edge Innovations Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 1 2 3 2
  • 3. Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
  • 4. “A” is for Assets Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
  • 5. “B” is for Brand Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
  • 6. NIST FIPS 140-1 & 201 OFAC 21CFR Part 11 CA SB 1386 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Sarbanes-Oxley FTC 16 CFR 314 Patriot Act PCAOB Audit WA SB 6043 ND SB 2251 IL SB 1479 PA SB 705 PIPEDA HSPD-12 FERPA FISMA PL107-347 EU Privacy GLB Basel II BSA HIPAA Compliance
  • 7. Getting a Handle on Compliance Ensuring Reality is in line with Theory Discover Classify Assess Monitor Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | • Automated Asset Discovery and Grouping • Patch Management • Configuration Controls • Enterprise Compliance • Continuous Monitoring Monitor Configuration Management & Audit Vulnerability Management Fix Analysis & Analytics Prioritize Policy Management Asset Management
  • 8. Three Things to Think About Security Drivers & Governance Protecting Our Systems Cutting-edge Innovations Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 1 2 8 3
  • 9. • Mitigating Insider Threats requires mandatory controls and auditing • Cloud (Administrators) introduce new risks • Persistent threats from Cyber attacks is the new normal Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 9 Leverage Protections for the Cyber, Insider Threats & Cloud
  • 10. Network uthenticate KING 18031 SCOTT 14220 PIERMAR 17170 KNOX 12029 KYTE 17045 CAREY 12032 HOECHST 18029 Org 30 Authentication Access sfING SCOjd ByAgE Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Data Protection in Context Privacy & integrity of data Monitoring & auditing Privacy & integrity of communications control SMITH gAMES fONES MIER Org 10 Org 20 Admin
  • 11. Three Things to Think About Security Drivers & Governance Protecting Our Systems Cutting-edge Innovations Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 1 3 11 2
  • 12. Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Continuous Monitoring High Ingest with Query • Approaching 200,000 EPS; 3 Billon (4TB) rows/day • From 12 users to > 100; Query response 70X faster – Most queries sub-second, longest query < 60 seconds • 14 Days of data retained expanded to 5 years – Enabled new queries which give needed insight • Data Compression 14X • 7:1 Reduction in Floor Space: Cost Savings 10X
  • 13. Innovations in Infrastructure Create New Capabilities Software in Silicon Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Performance In-Memory Acceleration Engines Reliability & Security Application Data Integrity Capacity Encryption & Compression Engines
  • 14. Reliability & Security: Application Data Integrity Revolutionary Change to Memory Architecture • Database In-memory places terabytes of data in memory – More vulnerable to corruption by bugs/attacks than storage • SPARC M7 Application Data Protection stops memory corruptions with no impact on performance • Hidden “color” bits added to pointers (key), and content (lock) • Pointer color (key) must match content color or program is aborted • Prevents access off end of structure, stale pointer access, malicious attacks, etc. plus improves developer productivity Memory Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Pointers Memory Content
  • 15. Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Concluding Points • Security in-depth with practical governance – Security is more than authentication and firewalls – Apply proven, natural and intuitive practices • Protection techniques mitigate all risks – Cloud – Cyber – Insider threats • Innovations in technology, innovations in thinking
  • 16. Safe Harbor Statement The preceding is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 16
  • 17. Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | 17