Tuesday Mar 19, 2013

Oracle OpenWorld Call for Papers

Oracle OpenWorld call for speaking proposals is now open. Take the stage at one of the biggest IT conferences of the year and take part in shaping the IT discussion of today and tomorrow. Through the year, we keep hearing about how Oracle Database Security customers are looking to hear from their peers, discuss Oracle solutions, and engage with our technology experts, so if you have experience with and expertise on Oracle Database Security, do submit your speaking proposal for Oracle OpenWorld. The call for papers closes on April 12. Visit the Call for Proposals section to get general information, content policies, tips, guidelines and more.

Oracle OpenWorld 2013 will be held this year from September 22 - 26 in San Francisco, CA.

Thursday Feb 28, 2013

Extending Data Governance Beyond the Database

Traditionally, enterprise data governance started within your database management system by establishing the appropriate access control and auditing policies to prevent unauthorized access and demonstrate those controls. Now a new generation of database security solutions allow organizations to extend database security policies beyond the database management system and across the enterprise.

By monitoring traffic to all their enterprise databases, organizations can now detect unauthorized activity before it reaches the database, and can take appropriate measures to block that activity. In addition, these solutions can consolidate database logs and analyze them in real-time to generate alerts as well as provide a secure centralized repository for audit data for regulatory purposes.

Conceptually similar to network intrusion detection and prevention systems (IDS/IPS) or security information and event management (SIEM) that are part of every organization’s network, KuppingerCole believes adoption of this new technology will become just as widespread at the database layer and will help strengthen existing controls within database management systems.

Join the discussion, March 21, 7 a.m. PST/11 a.m. EST, and learn about the new Oracle Audit Vault and Database Firewall solution. You will also hear about the organizations that have already adopted this solution as part of a database security defense-in-depth strategy.

Thursday Feb 07, 2013

Join Oracle at RSA Conference 2013

Oracle is exhibiting at RSA Conference 2013. The RSA Conference 2013 is a premier security conference that gives attendees a chance to learn about IT security's most important issues through first-hand interactions with peers, luminaries, and emerging and established companies.

Here’s a quick run-down of all things Oracle at this year’s RSA Conference.

Mark your Calendars:

Conference Session:
PNG F43: Waiter, There's a Fly in My Code

Mary Ann Davidson, Chief Security Officer, Oracle and Joshua Brickman, Program Director, CA Technologies
Friday, March 1, 11:40 a.m. -12:00 p.m. in Room 131

Oracle Solution Showcase:
While at the conference, catch the latest Database Security and Identity Management product demonstrations at Oracle Booth # 1941.

Exhibit Hours:
Monday, Feb 25, 2013 6:00 a.m. – 8:00 p.m. (Welcome Reception)
Tuesday, Feb 26, 2013 11:00 a.m. – 6:00 p.m.
Wednesday, Feb 27, 2013 11:00 a.m. – 6:00 p.m.
Thursday, Feb 28, 2013 11:00 a.m. – 3:00 p.m.

Book Signing with Mary Ann Davidson at Oracle Solution Showcase:
Plan to meet Mary Ann Davidson, Chief Security Officer, Oracle and receive an autographed copy of either "Outsourcing Murder" or her new book "Denial of Service", part of the Miss-Information Technology Series.

Book Signing Hours:
Monday, Feb 25, 2013 6:30 a.m. – 7:30 p.m.
Tuesday, Feb 26, 2013 1:00 p.m.– 2:00 p.m.
5:00 p.m. – 6:00 p.m.
Wednesday, Feb 27, 2013 1:00 a.m. – 2:00 p.m.

Meet Oracle Security Executives:
Oracle Security product management executives and experts will be in attendance at this year’s RSA Conference. Like to schedule a meeting? Simply send us a note with your information, areas of interest and 3 preferred time slots and we will confirm.

Get free access to the exhibit floor by registering here using the code: FXE13ORAC, compliments of Oracle. To take advantage of the complimentary code, you’d need to register by February 22.

We look forward to seeing you at RSA Conference 2013.

Wednesday Feb 06, 2013

(ISC)2 Security Briefing Series - The Easy Target: Your Unsecured Databases

Please join Oracle and (ISC)2 as we discuss the importance of detective, preventive, and administrative security controls for a comprehensive database security defense-in-depth strategy.

Part 1: 60 Seconds to Infiltrate, Months to Discover

According to leading industry reports, 98% of breached data originates from database servers and nearly half are compromised in less than a minute! Almost all victims are not aware of a breach until a third party notifies them and nearly all breaches could have been avoided through the use of basic controls. Join (ISC)2 and Oracle on January 31, 2013 for Part 1 of our next Security Briefings series that will focus on database security and the detective, preventive, and administrative controls that can be put in place to mitigate the risk to your databases. There's no turning back the clock on stolen data, but you can put in place controls to ensure your organization won't be the next headline.

Register Now

Part 2: As Attacks Evolve, Can You Prevent Them?
Thursday, February 21, 2013, 10am PST/1pm EST
The collaboration and sharing of information made possible by social media has enabled a new class of social engineering attacks, greatly increasing the risks posed by insiders for most organizations. Consider that LinkedIn searches for "Database Administrator" and "System Administrator" return over one million potential targets. In fact, stolen credentials were involved in 84% of the attacks that have resulted in over one billion records stolen from database servers. Join (ISC)2 and Oracle on February 21, 2013 for Part 2 of our Security Briefings series as we focus on database security and the preventive controls that can be used to mitigate the risks posed by insiders and attackers exploiting legitimate access to data and database infrastructure by adopting a defense-in-depth strategy. 
Part 3: Data Breaches are the Tip of the Iceberg
Date/Time: April 4, 2013, 10am PST/1pm EST
Digital security is the new battleground and cyber criminals are focused on stealing corporate and government secrets for financial and strategic gain. With increasing internal and external attacks and stronger regulatory compliance enforcement, investing in data security is a top priority for organizations; yet, significant gaps still exist at the very core — the databases that house the crown jewels. Join (ISC)2 and Oracle on Apr 4, 2013 for the conclusion of our Security Briefings series as we summarize implementing an effective database security strategy by using administrative controls that can help organizations discover where sensitive data resides and who has privileged access to this data.

Wednesday Nov 28, 2012

Introducing Next-Generation Enterprise Auditing and Database Firewall Webcast, 12/12/12

Join us, December 12 at 10am PT/1pm ET, to hear about a new Oracle product that monitors Oracle and non-Oracle database traffic, detects unauthorized activity including SQL injection attacks, and blocks internal and external threats from reaching the database. In addition, this new product collects and consolidates audit data from databases, operating systems, directories, and any custom template-defined source into a centralized, secure warehouse.

This new enterprise security monitoring and auditing platform allows organizations to quickly detect and respond to threats with powerful real-time policy analysis, alerting and reporting capabilities. Based on proven SQL grammar analysis that ensures accuracy, performance, and scalability, organizations can deploy with confidence in any mode.

You will also hear how organizations such as TransUnion Interactive and SquareTwo Financial rely on Oracle today to monitor and secure their Oracle and non-Oracle database environments.

Register for the webcast here.

Wednesday Nov 07, 2012

Gone in 60 Seconds: An Insecure Database is an Easy Target

According to the recent Verizon Data Breach Investigations Report, 98% of breached data originates from database servers and nearly half are compromised in less than a minute! Almost all victims are not even aware of a breach until a third party notifies them and nearly all breaches could have been avoided through the use of basic controls.

Join us for this November 28th webcast to learn more about the evolving threats to databases that have resulted in over 1 billion stolen records. Also, hear how organizations can mitigate risks by adopting a defense-in-depth strategy that focuses on basic controls to secure data at the source - the database.

There's no turning back the clock on stolen data, but you can put in place controls to ensure your organization won't be the next headline.

Note, this webcast will be recorded for on-demand access after November 28th. 

Thursday Oct 25, 2012

ISACA Information Security & Risk Management Conference, Nov 14-16

Please join Oracle, as a platinum sponsor, at this year's ISACA Information Security and Risk Management Conference in Las Vegas, Nov 14-16. This year’s conference offers up to 32 CPE hours and is designed to meet the needs of information security, governance, compliance, and risk management professionals. The event builds on and includes the key elements of information security, governance, compliance and risk management practices, and offers a fresh perspective on current and future trends.

As provider of the world’s most complete, open, and integrated business software and hardware systems, Oracle can uniquely safeguard your information throughout its entire lifecycle and is the recognized leader in Data Security, Identity Management, and Governance, Risk, and Compliance solutions.

Also, attend the Oracle Megatrends Session, Gone in 60 Seconds: Mitigating Database Security Risk and stop by our booth, # 100 & #102, to meet with Oracle Security Solution experts, see live product demos, and more.

Learn more and register.


Monday Oct 01, 2012

OpenWorld - Database Security Demonstrations in Moscone South Left

All this week, Oracle security experts will be giving live product demos of Oracle Database Security solutions in Moscone South Left, in the Oracle DEMOgrounds for "database." Demonstrations include Oracle Database Defense-in-Depth Security, Database Application Data Redaction, Transparent Data Encryption, Oracle Audit Vault and Database Firewall, Data Masking and Data Subsetting. Don't miss it!

General Session at OpenWorld: What’s Next for Oracle Database?

If you're at Oracle OpenWorld this week, don't miss today's general session to learn the latest Oracle Database news. See Andy Mendelsohn, Senior Vice President of Oracle Database Server Technologies, and others as they discuss "What's Next for Oracle Database?" from 10:45 a.m. to 11:45 a.m. in Moscone North Hall D.

Monday Sep 10, 2012

Oracle OpenWorld 2012: Focus On Database Security

Oracle OpenWorld 2012 is going to be the place to learn about Oracle Database Security solutions including Oracle Advanced Security with transparent data encryption, Database Vault, Audit Vault and Database Firewall, Label Security, and more.

We've put together this Focus On Database Security document so you'll know when and where to attend the key database security sessions, and not miss a thing. 

Monday Jul 16, 2012

IOUG 2012 Enterprise Data Security Survey Results

-- Please note: the date of this webcast has been changed to August 30, 2012 ---

The Independent Oracle Users Group (IOUG), the leading association of Oracle database and technology professionals, recently surveyed its members to determine the current state of enterprise data security. The survey covers all aspects of database security from access controls to activity monitoring and blocking, top security threats, and more. Join Oracle and IOUG security experts on July 26 as they share the latest survey results and discuss what organizations can learn from this comprehensive analysis to better combat security risks.

Register for the webcast and learn about

  • Key findings of the Enterprise Data Security Survey
  • Improving database security – enterprise-wide
  • Mitigating the risk of data breaches

Tuesday Jul 03, 2012

SANS Webcast: Label Based Access Controls in Oracle Database 11g

Controlling access to data subsets within an application table can be difficult and inefficient especially when faced with specific data ownership, consolidation and multi-tenancy requirements. However, this can be elegantly addressed using label based access control (LBAC). In this webcast you will learn how LBAC using Oracle Label Security and Oracle Database 11g can easily enforce row-level access based on user security clearance. In addition, Oracle security experts will discuss real world case studies demonstrating how customers, in industries ranging from retail to government, are relying on Oracle Label Security for virtual information partitioning and secure consolidation of information.

 Register for the July 12 webcast now.

Friday May 25, 2012

Oracle at Gartner Security & Risk Management Summit, June 11

Oracle is proud to be a Platinum sponsor of the Gartner Security & Risk Management Summit 2012 taking place June 11 – 14, in Washington DC. 

This year's Gartner Theme is  "Strategic Roadmaps to Secure the Enterprise and Reduce Risk"

A comprehensive security & risk event
The summit is the only time when the entire Gartner analyst and security and risk management community come together in one location to bring the latest research, insights and forward-thinking perspectives found nowhere else.

The summit features five in-depth programs and more than 140 sessions, and provides the ability to collaborate and network with peers, hear inspiring keynotes and gain immediate take-aways you can apply back to the office.

Oracle Highlights
Attend Oracle’s session, Checkmate: Data is King, on Tuesday, June 12, 9:30 a.m., Potomac Ballroom 1.

Attendees at the Gartner Security & Risk Management Summit 2012 will also have the opportunity to meet and interact with Oracle Security experts throughout the event.  Meet an Oracle expert face-to-face or stop by the Oracle booth and see Oracle’s products and solutions.

Register now.

Thursday Apr 05, 2012

Database Security Events in April

Tue, Apr 24, ISC(2) Leadership Regional Event Series - San Diego, CA

April 24 - May 17,  Independent Oracle Users Group Enterprise Data at Risk Seminar Series

  • Tue, Apr 24 IOUG Enterprise Data at Risk Seminar Series - Toronto
  • Wed, Apr 25 IOUG Enterprise Data at Risk Seminar Series - New York
  • Thu, Apr 26 IOUG Enterprise Data at Risk Seminar Series - Boston

Thu, Apr 26 ISC(2) Leadership Regional Event Series - San Jose, CA

Tuesday Feb 07, 2012

Concerned That Security Investments Still Leave You Vulnerable?

This Thursday at 9am, the ISACA Webcast Series presents a joint Forrester and Oracle presentation on how to formulate a database security strategy.

With the growing internal and external attacks on corporate and government applications and stronger regulatory compliance enforcement, investing in data security is a top priority for organizations. Yet significant gaps still exist at the very core — the databases that house the corporate crown jewels. A recent study by Forrester Consulting* found that most organizations don’t have a comprehensive enterprise database security strategy resulting in ad-hoc deployment of point solutions focused on detection rather than prevention. In this webcast, guest speaker Forrester Research, Inc. Principal Analyst Noel Yuhanna will discuss the findings of this study and the importance of an integrated and comprehensive database security platform that can provide better security at lower cost. You will also hear from Roxana Bradescu, Director of Database Security Product Management at Oracle, about the recent innovations in Oracle’s database security platform, and learn how you can make the most of your security investments.

Register now for ISACA Webcast this Thursday, February 9 at 9am PT/12pm ET.

*Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements, a commissioned study conducted by Forrester Consulting on behalf of Oracle, January 2012.

About

Who are we?

Follow us on

  • TwitterFacebookLinkedIn

Search

Archives
« April 2015
SunMonTueWedThuFriSat
   
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
  
       
Today