The Rise of the CSO Welcome

Similar documents
Defensible and Beyond

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Cyber Fraud What can you do about it?

Combating Cyber Risk in the Supply Chain

Maintaining Trust: Visa Inc. Payment Security Strategy

From Russia With Love

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

The State of Privacy in Washington State. August 16, 2016 Alex Alben Chief Privacy Officer Washington

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Security Readiness Assessment

Using international standards to improve US cybersecurity

All 3 Billion Yahoo Accounts Were Affected by 2013 Attack NY Times 10/3/17

Reviewing the 2017 Verizon DBIR

ISACA West Florida Chapter - Cybersecurity Event

Collaboration on Cybersecurity program between California University and Shippensburg University

ID Theft and Data Breach Mitigation

Cybersecurity Session IIA Conference 2018

Secure Application Development. OWASP September 28, The OWASP Foundation

Defense in Depth Security in the Enterprise

IC B01: Internet Security Threat Report: How to Stay Protected

Healthcare HIPAA and Cybersecurity Update

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016

IDENTITY AND THE NEW AGE OF ENTERPRISE SECURITY BEN SMITH CISSP CRISC CIPT RSA FIELD CTO

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Reducing Cyber Risk in Your Organization

It Takes the Village to Secure the Village SM

The Transformation in Security How RSA is responding to the Changing Threat Landscape

Cyber Security Updates and Trends Affecting the Real Estate Industry

Understanding the Changing Cybersecurity Problem

SFC strengthens internet trading regulatory controls

6 Vulnerabilities of the Retail Payment Ecosystem

PCI DSS Addressing Cyber-Security Threats. ETCAA June Gabriel Leperlier

ISE Cyber Security UCITS Index (HUR)

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

Cyber-Threats and Countermeasures in Financial Sector

Les joies et les peines de la transformation numérique

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

Think Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe

Defending Against Known & Unknown Threats

IT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

Altitude Software. Data Protection Heading 2018

Personal Cybersecurity

Cybersecurity is a Team Sport

ISACA January 2016 Cybersecurity Snapshot US Results. Number of respondents (n) = 862

Security Best Practices. For DNN Websites

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Strategies for a Successful Security and Digital Transformation

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

CYBERSECURITY SAVE YOUR BOTTOM LINE IBC Annual Convention Anne Benigsen, Bankers Bank of the West

June 2 nd, 2016 Security Awareness

Building a Business Case for Cyber Threat Intelligence. 5Reasons Your. Organization Needs a Risk-Based 5Approach to Cybersecurity

Cyber Insurance: What is your bank doing to manage risk? presented by

90% of data breaches are caused by software vulnerabilities.

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

World Broadcasting Unions Cyber Security Recommendations

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Hacking an Oracle Database and How to Prevent It

CLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Strategy is Key: How to Successfully Defend and Protect. Session # CS1, February 19, 2017 Karl West, CISO, Intermountain Healthcare

Effective Strategies for Managing Cybersecurity Risks

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Welcome! Copyright 2017 MAC. All Rights Reserved.

NERC Staff Organization Chart Budget 2019

New! Checklist for HIPAA & HITECH Compliance Pabrai

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Securing Your Secured Data

IoT Security Policy and Regulation Initiatives in China. Fan Dongyang, Huawei

Reading the Tea Leaves of the 2015 RSA Conference Submissions

STEVE GOODING JUNE 15, 2018

Cybersecurity Fundamentals

Cyber Security and Project Planning: How to Bake It In

Compliance Audit Readiness. Bob Kral Tenable Network Security

CYBERSECURITY: E-COMMERCE, GOVERNANCE AND APPLIED CERTIFICATIONS A ROUNDTABLE DISCUSSION 15 DECEMBER 2015

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Dan Lobb CRISC Lisa Gable CISM Katie Friebus

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

2016 Tri-State CF Partnership Webinar Series. Cyber Crime Trends a State of the Union April 7, 2016

Building Secure Systems

Teradata and Protegrity High-Value Protection for High-Value Data

NERC Staff Organization Chart Budget 2019

DEV5059: Using Machine Learning to Make DevSecOps a Reality Oracle Code One

NERC Staff Organization Chart Budget 2018

K12 Cybersecurity Roadmap

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Cybersecurity: Federalism as Defense-in-Depth

IT Risk Management and Cybersecurity Summit

Jordan Levesque Making sure your business is PCI compliant

Investigative Response Case Metrics Initiative Preliminary findings from 700+ data compromise investigations

LBI Public Information. Please consider the impact to the environment before printing this.

Dom Nessi Burns Engineering March 29, 2017 CYBERSECURITY TRENDS 2017 REPORT

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Transcription:

The Rise of the CSO Welcome David Profozich Senior Vice President North America Sales Oracle October 27, 2015

WELCOME THE 5 CSO TH SUMMIT @ OPEN WORLD 3

We re in the Age of Mega Breaches 200M Experian Mar 14 150M + Code Adobe Oct 13 53M Sony Dec 14 56M Home Depot Sep 14 98M Target Dec 13 150M ebay May 14 76M JPMC Oct 14 80M Anthem Feb 15 227M SA Banks OCT 13 20M Credit Bureau 12M Telecom Jan 14 22M Education July 14 Immigration June 14 Credit Cards Personal Records 4

Government Security Focus Increases in 2015 January President proposes national mandate to require 30 day data breach notification January State of the Union urges Congress for legislation to increase computer security June Cybersecurity sprint Federal CIO mandate to protect Federal info & assets October Cybersecurity awareness month; week 5 focus on education and awareness

Typical Attack Vectors SQL Injection Attack Stolen Credentials Brute Force Hacking Malware Social Attacks Command & Control

Global Cybercrime is a $288 Billion Problem Bigger than Stolen Phones, Cars, Credit Cards and the Cocaine Market Combined $56B STOLEN VEHICLE MARKET $85B COCAINE MARKET $30B STOLEN SMART PHONE $288 BILLION GLOBAL CYBERCRIME MARKET $114B STOLEN CREDIT CARD MARKET Source: Forrester, Interpol, Symantec

I often say that the CSO is the corporate rock-star of the future because exceptional ones possess a combination of skills that rarely appear in one person Brian Moynihan, CEO, Bank of America

Technical Curiosity is as Important as Aptitude 9

CSO: Chief Politician, Communicator, and Crisis Manager 10

11

Hacking and Malware Biggest Threats 900 800 700 600 500 400 300 200 100 1600% INCREASE HACKING MALWARE SOCIAL PHYSICAL 0-100 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 Hacking Malware Social Physical Misuse Error Source: 2014 Verizon DBIR

Oracle Can Reduce the Attack Surface Area by 80% 900 800 HACKING 700 600 500 400 300 200 100 80% 50% 19% 13% Privileged User Controls System Configuration Unprotected Databases MALWARE SOCIAL PHYSICAL 0-100 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 Hacking Malware Social Physical Misuse Error Source: 2014 Verizon DBIR

Oracle Can Help Mitigate TARGET 70M Records DEFAULT PASSWORD SOLUTION Regular password reset Strong password policy WEAK PASSWORDS SOLUTION Multi-factor authentication Automated config & patch ADOBE 152M Records ANTHEM 80M Records UNENCRYPTED DATA SOLUTION File system encryption Database encryption UNPATCHED SERVER SOLUTION Multi-factor authentication Automated config & patch JPMC 76M Records HOME DEPOT 56M Records STOLEN CREDENTIALS SOLUTION Multi-factor authentication Web-fraud detection Source: 2014 Verizon DBIR

Oracle Security From the Inside Out Identity Management Governance, Risk and Compliance Infrastructure Databases Applications Database Security Infrastructure Copyright 2015, Oracle and/or its affiliates. All rights reserved.

AGENDA 9:00 9:30 a.m. The Rise of the CSO Dave Profozich, SVP of North America Sales, Oracle 9:30 9:50 a.m. Securing Data in Retail Anantha Srirama, VP of New Technology, Macy s 9:50 10:05 a.m. Securing the Oracle Public Cloud Steve Daheb, SVP Business Groups, Oracle 10:05 10:20 a.m. Connecting the Dots with Identity Gautum Muralidharan, Dir Advisory Services, PwC 10:20 10:35 a.m. Innovations in Data Security Vipin Samar, VP of Database Security, Oracle 10:35 10:50 a.m. Break 16

AGENDA 10:50 11:05 a.m. Innovations in Identity Management Peter Barker, SVP Database Security, Oracle 11:05 11:25 a.m. Preparing for the Big Breach Andy Wells, VP TRO Access Management, Technology Operations, Kaiser Permanente 11:25 11:40 a.m. Securing the Big Data Lifecycle Niel Mendelson, VP, Advanced Analytics & Big Data, Oracle 11:40 12:00 p.m. Experts Panel - The Future of Security Mary Ann Davidson, CSO, Oracle Chris Gavin, VP of Information Security, Oracle Gautum Muralidharan, Dir Advisory Services, PwC 12:00 p.m. Conclusion Dave Profozich, SVP of North America Sales, Oracle