Security Readiness Assessment

Similar documents
LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Cloud Customer Architecture for Securing Workloads on Cloud Services

Cybersecurity Roadmap: Global Healthcare Security Architecture

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Oracle Security Products and Their Relationship to EBS. Presented By: Christopher Carriero

Consolidation Committee Final Report

Securing Data in the Cloud: Point of View

The Oracle Trust Fabric Securing the Cloud Journey

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Building a Resilient Security Posture for Effective Breach Prevention

OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting

Copyright 2011 Trend Micro Inc.

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Securing Your Cloud Introduction Presentation

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Secure & Unified Identity

Securing Your Digital Transformation

ADC im Cloud - Zeitalter

Designing and Building a Cybersecurity Program

Managing Microsoft 365 Identity and Access

Best Practices in Securing a Multicloud World

Security Landscape Thorsten Stoeterau Security Systems Engineer - Barracuda Networks

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Exam C Foundations of IBM Cloud Reference Architecture V5

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

How-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

Architecting Microsoft Azure Solutions (proposed exam 535)

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

Managing Your Privileged Identities: The Choke Point of Advanced Attacks

Security+ SY0-501 Study Guide Table of Contents

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Embracing a Secure Cloud. Cloud & Network Virtualisation India 2017

Minfy MS Workloads Use Case

Practical Guide to Cloud Computing Version 2. Read whitepaper at

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

Microsoft Azure Integration and Security. Course Code: AZ-101; Duration: 4 days; Instructorled

Cyber Security Updates and Trends Affecting the Real Estate Industry

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Session ID: CISO-W22 Session Classification: General Interest

SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS

Sobering statistics. The frequency and sophistication of cybersecurity attacks are getting worse.

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

A Security Admin's Survival Guide to the GDPR.

Qualys Cloud Platform

IBM services and technology solutions for supporting GDPR program

Vulnerability Management

Nebraska CERT Conference

Building Hybrid Clouds

CyberArk Privileged Threat Analytics

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Cyber Security Audit & Roadmap Business Process and

The Business of Security in the Cloud

Run the business. Not the risks.

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

Automating the Software-Defined Data Center with vcloud Automation Center

Security for the Cloud Era

Javier Villegas. Azure SQL Server Managed Instance

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved.

Secure wired and wireless networks with smart access control

DreamFactory Security Guide

The Etihad Journey to a Secure Cloud

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

20533B: Implementing Microsoft Azure Infrastructure Solutions

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

The Realities of Data Security and Compliance: Compliance Security

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

Network Visibility and Segmentation

Minfy MS Workloads Use Case

Securing Cloud Applications with a Distributed Web Application Firewall Riverbed Technology

Privileged Account Security: A Balanced Approach to Securing Unix Environments

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

CipherCloud CASB+ Connector for ServiceNow

Qualys Cloud Platform

MANAGED CLOUD SERVICES

Security and Compliance at Mavenlink

Security Diagnostics for IAM

SoftLayer Security and Compliance:

CompTIA CAS-002. CompTIA Advanced Security Practitioner (CASP) Download Full Version :

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

Microsoft 365. A complete, intelligent, secure solution to empower employees. Integrated for simplicity. Built for teamwork. Unlocks creativity

Reinvent Your 2013 Security Management Strategy

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Comprehensive Database Security

Benefits of Implementing a SaaS Cybersecurity Solution Andras Cser, VP Principal Analyst

Security Compliance and Data Governance: Dual problems, single solution CON8015

Access Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

Secure Access & SWIFT Customer Security Controls Framework

Practical Guide to Hybrid Cloud Computing. Cloud-Computing.

Oracle Database Security Assessment Tool (DBSAT) Overview

W H IT E P A P E R. Salesforce Security for the IT Executive

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

The 10 Principles of Security in Modern Cloud Applications

Transcription:

Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved.

Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS Cloud Internet of Things Social Mobile IDENTITY Big Data Copyright 2016, Oracle and/or its affiliates. All rights reserved. Oracle Public 2

Unified Threat Intelligence Security Firewall, IDS, IPS, WebProxy, VPN, AV, DLP, DAM, WAF, VA Scanners Host Windows, Linux, Unix SIEM UEBA CASB Applications 3 rd Party Apps, Oracle Apps, Custom Workloads IDM Cloud SaaS, PaaS, IaaS Networking Router, Switch, DHCP, DNS, Load Balancer Infrastructure EMM, Middleware, Database, Web Server, Hypervisor Copyright 2016, Oracle and/or its affiliates. All rights reserved. Oracle Public 3

Database Security: Attack Vectors SQL Attack Accidental Exposure DBA Permission Abuse Dev Team Snooping App User Snooping Archive Data Insider Threat APT or Malware Attack Data at Rest Attack Production Data Dev & Test Data Numerous attack vectors call for a layered, Defense-in-Depth security strategy Lost Disk or Tapes Exposed Keys Lost or Stolen Device Oracle Confidential. Copyright 2015 Oracle and/or its affiliates. All rights reserved. 4

Security Readiness Assessment Executive level, strategic engagement focused on aligning an organization s enterprise security architecture with business objectives A successful engagement will: Document an organization s current security and compliance posture Identify existing key risks and challenges Outline a desired future state architecture Recommend actionable steps on a strategic roadmap for achieving the future state Show how the recommended initiatives can deliver business value Copyright 2015 Oracle and/or its affiliates. All rights reserved. 5

Security Readiness Assessment Focus Areas User Lifecycle Management Authentication and Authorization Identity Repositories Cloud Services Database Security Operational Manageability Identity Lifecycle Management Role & Relationship Management Access Request, Approval and Fulfillment Password Management Auditing and Reporting Attestation/Certifica tion Privileged Account Management Authentication & SSO Risk-based Authentication and Authorization Fraud Detection Fine Grained Authorization Federation Social Sign-On Cloud and API Security Directories and databases containing Identity data Directory Virtualization Directory Synchronization Application Authentication Database Authentication Operating System Authentication Public cloud services employed and planned (SaaS, PaaS,IaaS) Deployment options (Public, Private, Hybrid) IAM for Cloud services (provisioning, audit, authentication, authorization, federation) Encryption Data Redaction Data Masking Access Discovery and Control Multi-Factor Authentication Data Classification SQL Injection Protection Audit and Compliance Centralized Authentication and Authorization (Optional area) Security Governance Configuration Controls Patch Management Diagnostics SLA Management Performance Tuning Copyright 2015 Oracle and/or its affiliates. All rights reserved. 6

Security Readiness Assessment Engagement Plan Executive Invitation Planning & Preparation Onsite Discovery Deliverable Preparation Executive Presentation 1 2 3 4 5 Copyright 2015 Oracle and/or its affiliates. All rights reserved. 7

SRA Customer Benefits Objective: Elevate Security Posture Focus on most important risks and challenges Support proactive planning for the future Prioritize needed improvements to reach a desired future state Facilitate cooperation on security initiatives Copyright 2015 Oracle and/or its affiliates. All rights reserved. 8

What Investment is Required? Strong executive support Strong tactical leadership Time, attention and candid participation Copyright 2015 Oracle and/or its affiliates. All rights reserved. 9