Cloud Security Perspectives and Insights

  • News
    March 3, 2019

Exploring Oracle Security at RSA

Taylor Lewis
Product Marketing Manager

It is finally here, RSA 2019 will be kicking off in three days! If you’ve had the opportunity to read our previous posts, you’ll see several mentions of Oracle sessions at RSA. Conference attendees will have several opportunities to learn about Oracle Security on the big stage, but we would also like to take a moment to highlight the mini sessions we are offering to attendees looking for a quick overview of Oracle Security. Each of the 15-minute sessions mentioned below will take place in our Oracle Security booth #1559 in the South Hall of the Moscone Center. Stop by to hear from our security subject matter experts as they present on some of the top challenges organizations are facing today. 

Core-to-Edge Integrated Security Layers
Monday, March 4th – 5:30pm, Wednesday, March 6th – 4:30pm, & Thursday, March 7th - 12:30pm
Troy Kitch, Senior Principal Product Marketing Director
Oracle’s core-to-edge approach to IT security helps organizations prevent, detect, respond to, and predict modern cybersecurity threats. Beginning from the core (your data) and continuing out to the edge (where your users connect), Oracle’s layers of integrated security controls are built to work together to intelligently protect hybrid and multi-cloud IT environments.

Threats to Your Data are Bigger Than They Appear
Tuesday, March 5th – 10:30am & Wednesday March 6th – 10:30am
Alan Williams, Senior Principal Product Manager, Database Vault, Label Security, RAS
Data is the most valuable asset in today's digital world, but without proper security, data can easily become your biggest liability.  Most critical business data is stored in databases, making them the prime targets for malicious actors who use a variety techniques to try to steal data. The battle between data security professionals and hackers is an asymmetric one, where the bad guys have access to all the infrastructure, all the tools, all the time, and all the hackers they need to accomplish their goals. Learn how Oracle Database Security protects your data with rings of controls and helps keep your organization compliant with regulatory mandates such as GDPR.

Leverage Oracle Security to Aid with New Privacy Requirements like the California Consumer Privacy Act
Tuesday, March 5th – 12:30pm
Ted Sherrill, Director, NAS Product Ambassadors Security
The California Consumer Privacy Act (CCPA) expands the rights of data subjects and requires businesses subject to it to increase transparency concerning the collection, use and disclosure of personal information. Oracle’s Core to Edge capabilities provide many automated controls that can be utilized to assist with meeting these requirements.

IT Operations and Cyber Security: Two Sides of the Same Coin
Tuesday, March 5th – 2:30pm
Dan Koloski, Vice President, Product Management & Business Development
Join this talk to learn about the similar challenges, analytic requirements and remediation mechanisms that make IT Operations and Cyber Security two sides of the same coin.  See how better collaboration and a common source of truth can simultaneously improve service levels and harden the security posture of a complex, hybrid, multi-cloud estate.

Preparing for the Four Dimensions of Cloud Security Threats
Tuesday, March 5th – 4:30pm
Mike Kane, Senior Manager, Product Management
Cybercrime is all around, literally. Threats to the integrity of your data on the cloud can come in four dimensions - inside threats, outside threats, top-down application threats and bottom-up infrastructure threats. This presentation explores these four different security threat dimensions and how Oracles Core-to- Edge Security strategy helps you to defeat each of them. Learn about key approaches to defeating some of the newest and most damaging security threats around.

Securing the Edge: Understanding and Managing Security Events
Wednesday, March 6 – 12:30pm
Laurent Gil, Evangelist Oracle Cloud Infrastructure
As distributed applications push more connectivity and functionality to the edge, application managers and DevOps teams must be aware of not only the evolving threat landscape but also design systems that are resilient in the face of evolving threats and the resulting volatility. We share the latest cybersecurity research findings based on real-world security operations along with innovative approaches to managing and mitigating security events at the cloud edge.

Maintaining Compliance and Control of Hybrid IT Estates
Wednesday, March 6th – 2:30pm
David Wolf, Senior Director of Product Management
Learn how proactive configuration and compliance management can help you maintain a hardened security posture across fast-moving, hybrid IT estates.

Measuring DDoS Protection and Why it Matters
Thursday, March 7th – 10:30pm
Julien Lehmann, Senior Product Strategy Director
The popularity of Cloud-based DDoS protection has grown as the size and complexity of DDoS attacks has increased. Examining route coverage percentages for DDoS attacks provides a critical measure of the effectiveness of cloud-based DDoS protection. This session will walk through detecting, tracking and measuring the rerouting of traffic to a DDoS protection provider, as observed in BGP routing data.

If you are not able to attend RSA, please visit the Oracle Security webpage to learn more about Oracle’s security solutions. Follow the Oracle Security twitter account for daily updates on the latest news.

Be the first to comment

Comments ( 0 )
Please enter your name.Please provide a valid email address.Please enter a comment.CAPTCHA challenge response provided was incorrect. Please try again.