Thursday Feb 28, 2013
Thursday Feb 07, 2013
By Troy Kitch-Oracle on Feb 07, 2013
Oracle is exhibiting at RSA Conference 2013. The RSA Conference 2013 is a premier security conference that gives attendees a chance to learn about IT security's most important issues through first-hand interactions with peers, luminaries, and emerging and established companies.
Here’s a quick run-down of all things Oracle at this year’s RSA Conference.
Mark your Calendars:
PNG F43: Waiter, There's a Fly in My Code
Mary Ann Davidson, Chief Security Officer, Oracle and Joshua Brickman, Program Director, CA Technologies
Friday, March 1, 11:40 a.m. -12:00 p.m. in Room 131
Oracle Solution Showcase:
While at the conference, catch the latest Database Security and Identity Management product demonstrations at Oracle Booth # 1941.
Monday, Feb 25, 2013 6:00 a.m. – 8:00 p.m. (Welcome Reception)
Tuesday, Feb 26, 2013 11:00 a.m. – 6:00 p.m.
Wednesday, Feb 27, 2013 11:00 a.m. – 6:00 p.m.
Thursday, Feb 28, 2013 11:00 a.m. – 3:00 p.m.
Book Signing with Mary Ann
Davidson at Oracle Solution Showcase:
Plan to meet Mary Ann Davidson, Chief Security Officer, Oracle and receive an autographed copy of either "Outsourcing Murder" or her new book "Denial of Service", part of the Miss-Information Technology Series.
Monday, Feb 25, 2013 6:30 a.m. – 7:30 p.m.
Tuesday, Feb 26, 2013 1:00 p.m.– 2:00 p.m.
5:00 p.m. – 6:00 p.m.
Wednesday, Feb 27, 2013 1:00 a.m. – 2:00 p.m.
Oracle Security Executives:
Oracle Security product management executives and experts will be in attendance at this year’s RSA Conference. Like to schedule a meeting? Simply send us a note with your information, areas of interest and 3 preferred time slots and we will confirm.
Get free access to the exhibit floor by registering here using the code: FXE13ORAC, compliments of Oracle. To take advantage of the complimentary code, you’d need to register by February 22.We look forward to seeing you at RSA Conference 2013.
Wednesday Feb 06, 2013
By Troy Kitch-Oracle on Feb 06, 2013
Please join Oracle and (ISC)2 as we discuss the importance of detective, preventive, and administrative security controls for a comprehensive database security defense-in-depth strategy.
According to leading industry reports, 98% of breached data originates from database servers and nearly half are compromised in less than a minute! Almost all victims are not aware of a breach until a third party notifies them and nearly all breaches could have been avoided through the use of basic controls. Join (ISC)2 and Oracle on January 31, 2013 for Part 1 of our next Security Briefings series that will focus on database security and the detective, preventive, and administrative controls that can be put in place to mitigate the risk to your databases. There's no turning back the clock on stolen data, but you can put in place controls to ensure your organization won't be the next headline.
The collaboration and sharing of information made possible by social media has enabled a new class of social engineering attacks, greatly increasing the risks posed by insiders for most organizations. Consider that LinkedIn searches for "Database Administrator" and "System Administrator" return over one million potential targets. In fact, stolen credentials were involved in 84% of the attacks that have resulted in over one billion records stolen from database servers. Join (ISC)2 and Oracle on February 21, 2013 for Part 2 of our Security Briefings series as we focus on database security and the preventive controls that can be used to mitigate the risks posed by insiders and attackers exploiting legitimate access to data and database infrastructure by adopting a defense-in-depth strategy.
Wednesday Nov 28, 2012
By Troy Kitch-Oracle on Nov 28, 2012
Join us, December 12 at 10am PT/1pm ET, to hear about a new Oracle product that monitors Oracle and non-Oracle database traffic, detects unauthorized activity including SQL injection attacks, and blocks internal and external threats from reaching the database. In addition, this new product collects and consolidates audit data from databases, operating systems, directories, and any custom template-defined source into a centralized, secure warehouse.
This new enterprise security monitoring and auditing platform allows organizations to quickly detect and respond to threats with powerful real-time policy analysis, alerting and reporting capabilities. Based on proven SQL grammar analysis that ensures accuracy, performance, and scalability, organizations can deploy with confidence in any mode.
You will also hear how organizations such as TransUnion Interactive and SquareTwo Financial rely on Oracle today to monitor and secure their Oracle and non-Oracle database environments.
Wednesday Nov 07, 2012
By Troy Kitch-Oracle on Nov 07, 2012
According to the recent Verizon Data Breach Investigations Report, 98% of breached data originates from database servers and nearly half are compromised in less than a minute! Almost all victims are not even aware of a breach until a third party notifies them and nearly all breaches could have been avoided through the use of basic controls.
Join us for this November 28th webcast to learn more about the evolving threats to databases that have resulted in over 1 billion stolen records. Also, hear how organizations can mitigate risks by adopting a defense-in-depth strategy that focuses on basic controls to secure data at the source - the database.
There's no turning back the clock on stolen data, but you can put in place controls to ensure your organization won't be the next headline.
Note, this webcast will be recorded for on-demand access after November 28th.
Thursday Oct 25, 2012
By Troy Kitch-Oracle on Oct 25, 2012
Please join Oracle, as a platinum sponsor, at this year's ISACA Information Security and Risk Management Conference in Las Vegas, Nov 14-16. This year’s conference offers up to 32 CPE hours and is designed to meet the needs of information security, governance, compliance, and risk management professionals. The event builds on and includes the key elements of information security, governance, compliance and risk management practices, and offers a fresh perspective on current and future trends.
As provider of the world’s most complete, open, and integrated business software and hardware systems, Oracle can uniquely safeguard your information throughout its entire lifecycle and is the recognized leader in Data Security, Identity Management, and Governance, Risk, and Compliance solutions.
Also, attend the Oracle Megatrends Session, Gone in 60 Seconds: Mitigating Database Security Risk and stop by our booth, # 100 & #102, to meet with Oracle Security Solution experts, see live product demos, and more.
Monday Oct 01, 2012
By Troy Kitch-Oracle on Oct 01, 2012
By Troy Kitch-Oracle on Oct 01, 2012
Monday Sep 10, 2012
By Troy Kitch-Oracle on Sep 10, 2012
Oracle OpenWorld 2012 is going to be the place to learn about Oracle Database Security solutions including Oracle Advanced Security with transparent data encryption, Database Vault, Audit Vault and Database Firewall, Label Security, and more.
We've put together this Focus On Database Security document so you'll know when and where to attend the key database security sessions, and not miss a thing.
Monday Jul 16, 2012
By Troy Kitch-Oracle on Jul 16, 2012
-- Please note: the date of this webcast has been changed to August 30, 2012 ---
The Independent Oracle Users Group (IOUG), the leading association of Oracle database and technology professionals, recently surveyed its members to determine the current state of enterprise data security. The survey covers all aspects of database security from access controls to activity monitoring and blocking, top security threats, and more. Join Oracle and IOUG security experts on July 26 as they share the latest survey results and discuss what organizations can learn from this comprehensive analysis to better combat security risks.
Register for the webcast and learn about
- Key findings of the Enterprise Data Security Survey
- Improving database security – enterprise-wide
- Mitigating the risk of data breaches
Tuesday Jul 03, 2012
By Troy Kitch-Oracle on Jul 03, 2012
Controlling access to data subsets within an application table can be difficult and inefficient especially when faced with specific data ownership, consolidation and multi-tenancy requirements. However, this can be elegantly addressed using label based access control (LBAC). In this webcast you will learn how LBAC using Oracle Label Security and Oracle Database 11g can easily enforce row-level access based on user security clearance. In addition, Oracle security experts will discuss real world case studies demonstrating how customers, in industries ranging from retail to government, are relying on Oracle Label Security for virtual information partitioning and secure consolidation of information.
Friday May 25, 2012
By Troy Kitch-Oracle on May 25, 2012
Oracle is proud to be a Platinum sponsor of the Gartner Security & Risk Management Summit 2012 taking place June 11 – 14, in Washington DC.
This year's Gartner Theme is "Strategic Roadmaps to Secure the Enterprise and Reduce Risk"
A comprehensive security & risk event
The summit is the only time when the entire Gartner analyst and security and risk management community come together in one location to bring the latest research, insights and forward-thinking perspectives found nowhere else.
The summit features five in-depth programs and more than 140 sessions, and provides the ability to collaborate and network with peers, hear inspiring keynotes and gain immediate take-aways you can apply back to the office.
Attend Oracle’s session, Checkmate: Data is King, on Tuesday, June 12, 9:30 a.m., Potomac Ballroom 1.
Attendees at the Gartner Security & Risk Management Summit 2012 will also have the opportunity to meet and interact with Oracle Security experts throughout the event. Meet an Oracle expert face-to-face or stop by the Oracle booth and see Oracle’s products and solutions.
Thursday Apr 05, 2012
By Troy Kitch-Oracle on Apr 05, 2012
Tue, Apr 24, ISC(2) Leadership Regional Event Series - San Diego, CA
April 24 - May 17, Independent Oracle Users Group Enterprise Data at Risk Seminar Series
Thu, Apr 26 ISC(2) Leadership Regional Event Series - San Jose, CA
Tuesday Feb 07, 2012
By Troy Kitch-Oracle on Feb 07, 2012
This Thursday at 9am, the ISACA Webcast Series presents a joint Forrester and Oracle presentation on how to formulate a database security strategy.
With the growing internal and external attacks on corporate and government applications and stronger regulatory compliance enforcement, investing in data security is a top priority for organizations. Yet significant gaps still exist at the very core — the databases that house the corporate crown jewels. A recent study by Forrester Consulting* found that most organizations don’t have a comprehensive enterprise database security strategy resulting in ad-hoc deployment of point solutions focused on detection rather than prevention. In this webcast, guest speaker Forrester Research, Inc. Principal Analyst Noel Yuhanna will discuss the findings of this study and the importance of an integrated and comprehensive database security platform that can provide better security at lower cost. You will also hear from Roxana Bradescu, Director of Database Security Product Management at Oracle, about the recent innovations in Oracle’s database security platform, and learn how you can make the most of your security investments.
Register now for ISACA Webcast this Thursday, February 9 at 9am PT/12pm ET.
*Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements, a commissioned study conducted by Forrester Consulting on behalf of Oracle, January 2012.
Thursday Feb 02, 2012
By Troy Kitch-Oracle on Feb 02, 2012
RSA Conference 2012 attendees will also have access to Oracle security experts with in-depth insight into the latest developments in Oracle Database Firewall, including extended support for MySQL Enterprise Edition, new reporting infrastructure for modifying the layout of existing reports, new built-in reports to help comply with regulatory mandates and more.
Until February 24, 2012, attendees can also opt to register for a complimentary exhibit hall-only pass by using discount code EC12ORAC.
Who are we?
Follow us on
- Top Two Cloud Security Concerns: Data Breaches and Data Loss
- All Data is Not Equal, Map Security Controls to the Value of Data
- Oracle Cloud Forum - Mapping Security Controls to the Value of Data
- 34% of Organizations Say Data Breach “Somewhat likely” to “Inevitable” in 2015
- Oracle Security Webcast Series for UK Customers
- Encrypting, Redacting and Masking at Epsilon
- Why Infinity Insurance Chose Oracle Advanced Security and Database Vault
- ISACA Webcast: Data-Centric Audit and Protection, Reducing Risk and Improving the Security Posture
- New KuppingerCole Report on Audit Vault and Database Firewall
- SANS Webcast: Simplifying Data Encryption and Redaction Without Touching the Code