Monday Sep 30, 2013

ISACA Hosts Webcast w/ David Cusick from Zurich

Access governance has become more complex as regulations have increased and audit controls now span multiple applications. Audit requirements for single applications are simple by comparison to multiple system requirements. As the number of applications increase, streamlining becomes more important. In this session, David Cusick, Group Information Security Director at Zurich Insurance, shares his learning experiences from streamlining access governance. Join David for an encore presentation of this webcast, hosted by ISACA.

Friday Sep 27, 2013

Encore Webcast: Health IT & UPMC Discuss IdM in Healthcare w/ CloudConnect

It is vital that hospitals effectively manage how users are able to access and use information. Effective identity management (IdM) dramatically improves organizational efficiency, reduces the health care providers IT footprint and cost, supports regulatory compliance, improves security, and enables access to emerging technologies such as mobility and patient portals. CloudIdentity provides health care specific identity management capabilities based on Oracle technology and delivered securely via the cloud, allowing hospitals to quickly realize the many benefits of IdM.

John Houston Vice President of Privacy and Information Security, Associate Counsel at UPMC & President of CloudConnect Health IT presents this informative webinar, as he discusses how IdM allows health care organizations to securely unlock the potential of health care IT. Join us for this encore presentation with John Houston!

Monday Sep 23, 2013

Privacy and Security by Design: An Enterprise Architecture Approach by Mark Dixon (Oracle)

Is your organization emphasizing an approach of developing privacy and security within every aspect of your application architecture?  Are you a software developer struggling to understand how to merge privacy and security into your code? Are you a systems integrator working to keep up with the latest regulatory, compliance and privacy needs and how to merge this into your customers?  Or are you a corporate CISO/CIO wanting to understand how your organization should be developing the strongest Privacy and Security processes?

Today, we are pleased to announce publication of a paper entitled “Privacy and Security by Design: An Enterprise Architecture Approach,” written by Ann Cavoukian, Ph.D., Information & Privacy Commissioner, Ontario, Canada, and co-authored by Mark Dixon from Oracle.

In the foreword to the paper, Dr. Cavoukian wrote:

In an earlier paper with Oracle, we discussed the convergence of paradigms between the approach to privacy I have long championed called Privacy by Design, and a similar approach to security called ‘Security by Design.’ The current and future challenges to security and privacy oblige us to revisit this convergence and delve deeper. As privacy and security professionals, we must come together and develop a proactive approach to security – one that is indeed “by design.” To this end, I am delighted to be partnering with Mark Dixon, Enterprise Architect, Information Security, at Oracle Corporation, on this joint paper.

This paper has two key objectives:

  • Define a set of foundational “Security by Design” principles that are modelled upon and support the 7 foundational principles of Privacy by Design.
  • Illustrate an enterprise-level process for defining and governing the strategic journey of Security by Design through an enterprise architecture approach.

To achieve these objectives, the paper includes the following major sections:

  • Foundational Principles of Privacy by Design
  • Foundational Principles of Security by Design
  • The Enterprise Security Journey
  • Conclusion

This is a great opportunity to hear some of the best practices being recommended by both Oracle, and leading government agencies to understand how Privacy and Security should be factored in, across the board.

Click on the link, to get access to the Privacy by Design page which is hosting not only the whitepaper, but a great video with Ann Cavoukian, outlining some of what you will learn in this paper. We hope this paper will assist developers, integrators and enterprises to deliver stronger security and better privacy, for all of their stakeholders – a win/win proposition.

Friday Sep 20, 2013

CON8829: Partnering for Success with your System Integrator - OOW13 MUST SEE

OpenWorld 2013 is almost here.  I am very excited to tell you a little bit about my session.  I will be speaking with several of Oracle's top tier partners in CON8829 which will be on Wednesday at 10:15 am in Moscone West room 2018.

This is a bit of a free form session, where each of the panelist will give a little bit of an update on major trends they are seeing in the market.  Then, we will have a live Q&A session which will be lead by the hard hitting, yet erudite Scott Bonnell.

On the panel this year will be:

  • Andrew Morrison, from Deloitte and Touche, LLP
  • Alexander Bollonte, from Accenture
  • Rex Thexton, from PwC, LLP
  • and me, Darin Pendergraft from Oracle

We did this session last year, and it was a lot of fun.  This will be a good opportunity to ask your questions, and to hear what the partners are focusing on.  Come join us on Wednesday!

https://oracleus.activeevents.com/2013/connect/sessionDetail.ww?SESSION_ID=8829


Thursday Sep 19, 2013

CON8811: Converged Identity Governance for speeding up business and reducing cost

We talk a lot about the platform approach to Identity Management: and in CON8811, Sanjay Rallapalli explains how the Platform Approach applies to Identity Governance.

He will show how a platform approach enables organizations to pursue end-to-end user lifecycle management and closed-loop remediation for both standard and privileged user access, driving down costs by automating error prone manual processes.

Joining Sanjay on stage to give their perspective will be Chris Commerford from Pfizer, Rich Flees from Qualcomm, and Dariusz Spiewak, from ZUS, Poland.

Click this link to get more information and to register for the session: https://oracleus.activeevents.com/2013/connect/sessionDetail.ww?SESSION_ID=8811

CON8828: Justifying and Planning a successful Identity Management Upgrade

One of the things the IDM team has been focused on, is providing an upgrade path to our SUN customers and CON8828 is focused on just that.

On Wednesday, September 25 @ 10:15 am, Sanjay Rallapalli will talk you through the major considerations when planning an upgrade, such as:

  • Do you need to do data migration?
  • Do you have a test plan?
  • Do you have a backup?
  • Will your upgrade be in-place?

Sanjay will be joined on stage by Anthony Undorf from ETS, and Shanti Vellanki from Safeway who will share their upgrade experiences.

Be sure to register for this session to reserve your spot, as I am sure it will fill up.

https://oracleus.activeevents.com/2013/connect/sessionDetail.ww?SESSION_ID=8828


Wednesday Sep 18, 2013

OOW 2013 Content: API Management: Enable Your Infrastructure for Secure Mobile and Cloud Use

Is your organization prepared for the expanding roles of mobile & cloud, and the enabling capabilities of REST-based APIs and Web services?

API Management: Enable Your Infrastructure for Secure Mobile and Cloud Use CON8817 will explore how organizations are able to launch mobile and cloud applications with little or no change to their existing systems by leveraging Oracle’s complete mobile access management solution. In addition to presenters from Oracle, this session will also feature Peter Tsatsaronis (nab) and Matt Topper (UberEther, Inc).

Plan on attending this session on:

Tuesday, Sep 24, 5:15 PM - 6:15 PM - @ Moscone West - 2017

Tuesday Sep 17, 2013

OOW 2013 Content: Attract New Customers and Users by Leveraging Bring Your Own Identity (BYOI)

Why do you have so many virtual identities? Most individuals currently have an internet mail identity, several social networking identities, and corporate virtual identities...and don’t really want more identities to manage.

Attract New Customers and Users by Leveraging Bring Your Own Identity (BYOI) CON8834 explores the trend of enabling people to identify themselves by using popular social networking identities to access business services. Presenting in this session will be Vikas Mahajan (AARP), Robert Arnaud (BeachBody) and Jie Yin (Oracle Product Management).

Plan on attending this session on:

Tuesday, Sep 24, 3:45 PM - 4:45 PM - @ Moscone West - 2018

OOW 2013 Content: Securely Enabling Mobile Access for Business Transformation

Online communication has been transformed by the advent of effective mobile computing, and more organizations are providing employee and customer access to services via mobile devices.

Securely Enabling Mobile Access for Business Transformation [CON8896] will review the security and usability concerns that are further compounded by bring your own device (BYOD) policies. In addition to speakers from Oracle, this session will also include presenters Arup Thomas (Verizon Wireless) and Abdullah Togay (Ministry of National Education).

Plan on attending this session on:

Tuesday, Sep 24, 12:00 PM - 1:00 PM - @ Moscone West - 2018

Saturday Sep 14, 2013

CSO Summit Recordings

If you are attending Leaders Circle this year, be sure to catch the CSO Summit. This year will feature several customer case studies and a panel discussion featuring Mary Ann Davidson, Oracle's CSO and Chris Gavin, Oracle's VP of Information Security. Below are a few links to previous CSO Summit talks that you may find interesting.

CSO Summit Recorded Presentations:

Friday Sep 13, 2013

200 Million: Directory Deployment at Verizon CON4535

Verizon Wireless is one of the fastest growing mobile carriers in the world with a brand and reputation for quality of service. Serving more than 90 million users with more than 220 million entries, Verizon required a modern access and directory infrastructure to deliver a secure and user-friendly experience with high performance and availability. To grasp the dramatic scale that telecommunications organizations will have to address, the chart below shows how global data traffic has grown in the past five years with 100% growth between 2011 and 2012. 

They also needed risk-aware, social-ready access control that could adapt in real time to enhance security while improving usability; a high-performance directory capable of searches/modifications in 1 to 2 ms and additions in less than 10 ms, with the ability to quickly load hundreds of millions of entries to ensure performance; and a multi-master setup to deliver scalability and high availability.  The chart below provides a baseline for global smart phone subscription growth and highlights the pressure to gain new subscribers and share of market for Verizon and other telecommunications firms.

Attend this session to learn how Verizon Wireless leverages Oracle Access Management Suite and Oracle Unified Directory to provide exceptional services to its members. Register here 

Thursday Sep 12, 2013

OOW 2013 Content: Access at Scale for Hundreds of Millions of Users

Scalability has become a much more important requirement for IDM professionals as we expand to securely accommodate multiple personal networked devices with access to our corporate apps and data.

Access at Scale for Hundreds of Millions of Users [CON8833] will take a look at this trend and will review several business cases.  In addition to the Oracle speakers, this session will feature Nirmal Rahi, Solution Architect from College Board, Brendan McGuire, Director from KPMG and Chirag Andani, Sr. Director, Identity & Access Management, PDIT - Oracle.

Plan on attending this session on:

Monday, Sep 23, 12:15 PM - 1:15 PM - @ Moscone West - 2018

Oracle Identity Management Leveraging Oracle's Engineered Systems

Enterprises deploy Information Technology (IT) applications in various ways today. They may use on-premise physical servers, virtualization, private clouds, public clouds, or a combination thereof. In all cases, the main goals include improving the ease of application deployment, increasing system performance, providing security across the enterprise, and ensuring contained costs.

This white paper presents the business benefits of leveraging Oracle’s engineered systems for deploying and running Oracle Identity Management. Click to read

Oracle OpenWorld: Context and Risk-Aware Access Control: Any Device Anywhere

Are you attending Oracle OpenWorld 2013?  What are you doing to manage access to information, from any device, anytime...and from anywhere?

Customers expect consistent levels of service across laptop, tablet, and smartphone, but the very nature of mobile computing introduces a whole new range of security concerns, such as device type and configuration, location, type of connection, data to be accessed, and transactions to be performed. All of these factors are to be evaluated at runtime in an authentication and authorization decision. Essentially, a security system must adapt to changes in context and risk level at the time of the request. This session will help you understand how Oracle’s access management technology intelligently reacts to changes in context across a variety of devices to maximize levels of security and control.  REGISTER NOW for this session at this year's Oracle OpenWorld 2013.  For a complete listing of Security focused tracks at this year's OOW2013, please click HERE


Wednesday Sep 11, 2013

OOW Session: Who should Have Access to What , Risk = Hazard + Outrage

Risk = Hazard + Outrage. This was Peter Sandman's simple formula for executives to evaluate the risk and response to a potentially brand damaging event. With user access, the formula applies as well. If a trusted administrator gets access to the latest product specs and discloses the information to the public without consent, the hazard is financially high and the shareholder outrage is perhaps equivalently high. The net is directly equivalent to the risk of the event happening. 

So when we consider who should have access to what, different users constitute different risk.  A single administrator with root access may create a higher risk than the intern working in the mail room. The risk is directly related to the system and the data to which these individuals have access. Governing the data is directly related to how we govern the user access. 

If these topics interest you, You will want to catch Jim Taylor and Neil Gandhi at Open World in session "CON8810: Who Should have Access to What -- Better risk management with Identity Governance" . Complete list of sessions click here.

Monday Sep 09, 2013

Webinar: The benefits of adopting cloud-based technologies - Register TODAY!

It is vital that hospitals effectively manage how users are able to access and use information. Effective identity management (IdM) dramatically improves organizational efficiency, reduces the health care providers IT footprint and cost, supports regulatory compliance, improves security, and enables access to emerging technologies such as mobility and patient portals. CloudIdentity provides health care specific identity management capabilities based on Oracle technology and delivered securely via the cloud, allowing hospitals to quickly realize the many benefits of IdM.

Join John Houston Vice President of Privacy and Information Security, Associate Counsel at UPMC & President of CloudConnect Health IT for this informative webinar series, as he discusses how IdM allows health care organizations to securely unlock the potential of health care IT. REGISTER

Identity and Access Management: Coming of Age in Health Care
September 11, 2013
2:00pm EDT/11:00am PDT

The use of IdM allows a health care provider to enforce appropriate access to its health care applications. IdM is also critical to improving efficiency and enabling support for new technologies
like mobility. Attendees will learn how this unique blend of market leading technology and health care identity management expertise will allow your organization to affordably access the many benefits of idM. To join part 1 of this 3 part series, click below to REGISTER:

https://cc.callinfo.com/cc/s/registrations/new?cid=1qxyimffb4jwd

Amit Jasuja's OOW2013 IDM Presentation - Oracle IDM: Enabling Business Growth in the New Economy

Hello Everyone!

The IDM team is feverishly working to get everything ready for another amazing OpenWorld conference.  There is going to be a lot to do and see, and to help you get around, we have created several tools to help you build a schedule.

The Focus on Identity Management page is the best way to take a look at all of the sessions that are being presented by the Oracle IDM team. You can click on the title and see a detailed summary of the session, and once you are on the session page, you can register to attend (if you are logged in).  Last year we had several sessions fill up, so if you see something you really like, but sure to register to save a spot.

The IDM team will also be blogging about our sessions to give you more of a preview of what you are going to see.  I will get things started off by telling you a little bit about Amit Jasuja's presentation - Oracle IDM: Enabling Business Growth in the New Economy [CON8808].

Amit's presentation represents our overall theme this year of demonstrating how Identity Management technologies and practice can not only protect your business, but more importantly, can help your business grow by allowing you to securely offer new business services in the new mobile, social and cloud app economy.  Amit's session will include demos of secure mobile access that you will definitely find interesting.

We are also very pleased to have two customer spotlights during his session featuring Dominic Fedronic from VISA, and Adam Hergert from ANZ Bank.  Both of these customers will discuss how they are using Oracle IDM to offer new services while maintaining the highest level of security and regulatory compliance.

Be sure to register for this session, as I am sure it will fill up quickly: Register for Amit's Session


About

Oracle Identity Management is a complete and integrated next-generation identity management platform that provides breakthrough scalability; enables organizations to achieve rapid compliance with regulatory mandates; secures sensitive applications and data regardless of whether they are hosted on-premise or in a cloud; and reduces operational costs. Oracle Identity Management enables secure user access to resources anytime on any device.

Search

Archives
« September 2013 »
SunMonTueWedThuFriSat
1
2
3
4
5
6
7
8
10
15
16
21
22
24
25
26
28
29
     
       
Today