Tag: Multi-Layered Security Planning

Oracle Data Safe is a fully-integrated cloud service that helps organizations secure their enterprise data with a comprehensive set of features for protecting sensitive and regulated data in Oracle Cloud. An Oracle Data Safe introductory video describes the data security challenges that organizations face and how Oracle Data Safe can address with its five main features:
-Security Assessment
-Data Discovery
-Data Masking
-User Assessment
-Activity Auditing

A recent PeopleSoft Spotlight Series video took a closer look at PeopleSoft security and how you and your team can work together to build out a strongly protected application. The video covered security considerations for the CEO, how to prevent PeopleSoft from becoming collateral damage, elements of a security infrastructure, and questions for your IT security staff.

Caroline Wong, Chief Security Strategist at Cobalt.io, a cybersecurity company, wrote an article in Forbes about 10 cybersecurity blind spots that companies should keep an eye on. These are issues that security teams don’t always see or aren’t always accounting for, but they should be.

101470 Presented at RECONNECT 19

With more enterprises hosting mission-critical applications like Oracle-PeopleSoft in the cloud, application managers and DevOps teams need to be aware of the evolving threat landscape. They also need to architect the deployment to be resilient in the face of ever-evolving threats. In this talk, Laurent Gil will share the latest cybersecurity research findings based on real-world security operations along with innovative approaches to managing and mitigating security events at the cloud edge. He'll also talk about how one global energy and waste management firm strengthened its security posture and protected its cloud-based PeopleSoft implementation from DDoS attacks with the Oracle Web Application Firewall (WAF). You'll learn about the steps companies take—and the security challenges they overcome—when moving PeopleSoft to Oracle Cloud Infrastructure.

Presented by Laurent Gil, Oracle Corp.

Barb Darrow, Senior Director of Communications at Oracle, wrote about today’s “unprecedented challenge” of cybersecurity. Technological and legal complexities are continuing to grow in this age of heightened cybersecurity threats—including a rise in state-sponsored hacking. This “unprecedented challenge” was a topic of conversation between Dorian Daley, Oracle Executive Vice President and General Counsel, and Edward Screven, Oracle’s Chief Corporate Architect during Oracle’s recent Media Days.

Dorian Daley, Executive Vice President and General Counsel at Oracle, and Edward Screven, Chief Corporate Architect at Oracle, spoke about the current threat landscape and Oracle’s strategy for addressing it. The pair spoke about how Oracle is enhancing the relationships with customers by adopting a service model that allows customers to shift the security burden and risk to Oracle. They also covered how Oracle has rebuilt Cloud and the Autonomous Database, so customers are fully equipped to truly protect their data and eliminate human error from the security equation.

Every CFO knows the opportunity to commit fraud is prevalent in an ERP system. Implementing controls such as Segregation of Duties is a critical tool in discouraging and preventing fraudulent activities. Designing appropriate roles and reporting tools allow the CFO to establish and maintain a reliable control environment. Levi Gibson, Pinal County Government Session: 107800,…

110320 Presented at COLLABORATE 19 Join us for this session to learn how to make your JDE security refreshed, relevant and compliant! JDE SECURITY BEST PRACTICES: Discover how to overcome challenges, use best practices, and what design decisions might cause issues if you don’t approach your security with care! Learn about traditional JDE security, UDO,…

109680 Presented at COLLABORATE 19 Oracle Cloud HCM Security - From Moonless Night to Moonlit Night" is geared towards an audience interested in Human Capital Management (HCM) Security. I will review our journey starting with our Implementation and then transitioning to the maintenance of security. I will also discuss the improvements in Oracle Cloud Security…