Friday Dec 13, 2013

Passing the Puck to the CTO - BeachBody's Miracle Moment of Identity

BeachBody CTO, Arnaud Robert, was prepared for competitive business at an early age.  Showing success on the ice as a captain of his hockey team, taught Arnaud that there are many similarities between the game of hockey, in particular, the position of team captain, and that of today's CTO.  As Arnaud points out, today's CTOs must remain very nimble and capable of acting much like that of a team captain.  Regardless if we are talking pucks and tasks, periods and quarters or games and projects, the methodologies in managing has given Arnaud a focus with the BeachBody business that he has used to expand the BeachBody enterprise in the areas of Identity Management and Mobile Enablement.

Take a moment to watch this great video from Arnaud and see if you and your CTO can relate to the hockey challenges, and how you are responding in the areas of Identity.


Monday Sep 23, 2013

Privacy and Security by Design: An Enterprise Architecture Approach by Mark Dixon (Oracle)

Is your organization emphasizing an approach of developing privacy and security within every aspect of your application architecture?  Are you a software developer struggling to understand how to merge privacy and security into your code? Are you a systems integrator working to keep up with the latest regulatory, compliance and privacy needs and how to merge this into your customers?  Or are you a corporate CISO/CIO wanting to understand how your organization should be developing the strongest Privacy and Security processes?

Today, we are pleased to announce publication of a paper entitled “Privacy and Security by Design: An Enterprise Architecture Approach,” written by Ann Cavoukian, Ph.D., Information & Privacy Commissioner, Ontario, Canada, and co-authored by Mark Dixon from Oracle.

In the foreword to the paper, Dr. Cavoukian wrote:

In an earlier paper with Oracle, we discussed the convergence of paradigms between the approach to privacy I have long championed called Privacy by Design, and a similar approach to security called ‘Security by Design.’ The current and future challenges to security and privacy oblige us to revisit this convergence and delve deeper. As privacy and security professionals, we must come together and develop a proactive approach to security – one that is indeed “by design.” To this end, I am delighted to be partnering with Mark Dixon, Enterprise Architect, Information Security, at Oracle Corporation, on this joint paper.

This paper has two key objectives:

  • Define a set of foundational “Security by Design” principles that are modelled upon and support the 7 foundational principles of Privacy by Design.
  • Illustrate an enterprise-level process for defining and governing the strategic journey of Security by Design through an enterprise architecture approach.

To achieve these objectives, the paper includes the following major sections:

  • Foundational Principles of Privacy by Design
  • Foundational Principles of Security by Design
  • The Enterprise Security Journey
  • Conclusion

This is a great opportunity to hear some of the best practices being recommended by both Oracle, and leading government agencies to understand how Privacy and Security should be factored in, across the board.

Click on the link, to get access to the Privacy by Design page which is hosting not only the whitepaper, but a great video with Ann Cavoukian, outlining some of what you will learn in this paper. We hope this paper will assist developers, integrators and enterprises to deliver stronger security and better privacy, for all of their stakeholders – a win/win proposition.

Thursday Jul 11, 2013

NEC Australia hosts Part 2: Identity Governance Key Insights

NEC Australia is back with Part 2, in their two part series with key leaders from the Oracle Identity Management product team. Host Larry Samuels of NEC Australia takes us into the topic area of "Identity Governance Key Insights".  This includes key information on point-in-time audits and their use as a baseline, as well as steps your organization can take to minimize your risk by better understanding the complexity of your identity enviroment.  To view this video, click HERE

 

Wednesday Jul 10, 2013

NEC Australia hosts video Roundtable on "Key Trends in Identity Management" (Part 1)

Join NEC Australia as they host a Roundtable discussion with key members from Oracle, to discuss the Key Identity Management Trends. Host Larry Samuels of NEC Australia leads this conversation with experts in the field of Identity Management to discuss how the landscape is changing and evolving to encompass the new demands of Cloud, Mobile and regulatory compliance.  With him are Amit Jasuja, Sr Vice President of Identity Management at Oracle Corporation, to help us navigate the ever changing demands of IT, and how partners like NEC are working with Oracle to meet those demands. To view Part 1 of this video, click HERE

Tuesday Aug 30, 2011

Got Audit Eye?

Are you at a loss come audit time? Still trying to figure out how you can realistically confirm for ALL your employees and across ALL your enterprise systems who has access to what and when? You are not alone; just check out this video and remember Oracle Identity Analytics can help.

 Audit Eye

About

Oracle Identity Management is a complete and integrated next-generation identity management platform that provides breakthrough scalability; enables organizations to achieve rapid compliance with regulatory mandates; secures sensitive applications and data regardless of whether they are hosted on-premise or in a cloud; and reduces operational costs. Oracle Identity Management enables secure user access to resources anytime on any device.

Search

Archives
« April 2014
SunMonTueWedThuFriSat
  
1
3
4
5
6
7
8
11
12
13
15
17
18
19
20
21
22
23
24
25
26
27
28
29
30
   
       
Today