eu datenschutzverordnung stefan schmidinger oracle · pdf fileeu datenschutzverordnung ......
TRANSCRIPT
EU Datenschutzverordnung 5/3/2016
1
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle University27th April
2016
Stefan Schmidinger +Karin Feist + Pavel Veljacik
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Agenda
1
2
3
Welcome
Intro
Security
Oracle Confidential – Internal/Restricted/Highly Restricted 3 Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle University Team Austria
Karin FeistEducation Account Manager
Stefan SchmidingerEducation Account Manager
Fons de Koo Sales Director OU – Austria, Central
and North Eastern Europe
Public
Health Care
Education
Utilities
Engineering
Banking & Insurance
Professional Services
Retail & Wholesale
Media & Entertainment
Industrial & Transportation
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Security
Oracle Confidential – Internal/Restricted/Highly Restricted 5 Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Mitigate Data Breaches Address Regulatory Compliance
Two Reasons Customers Buy Oracle Database Security
Oracle Confidential – Restricted 6
EU Datenschutzverordnung 5/3/2016
2
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
200M Credit Bureau
Mar ‘14
2M
Telecom
OCT ‘13
150MeCommerce
May ‘14
22MEducation
July ‘14
SA Banks
OCT ‘13
Credit
Cards
150M +
CodeHiTech
Oct ‘13
98MRetailerDEC ‘13
20MCredit Bureau
12MTelecom
Jan ‘14
56MRetailerSep ‘14
Immigration
June’14
Personal
Records
76MFin SvcsOct ‘14
The Age of Mega Breaches
7
80MHealthcare
Feb ‘15
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
52%
34%
11%
4%
Database
Network
Application
Middleware
IT Layers Most Vulnerable To Attacks
67%
15%
15%
3%
Database
Network
Application
Middleware
Allocation of Resources To Secure IT Layer
Source: CSO Online MarketPulse, 2013
8Oracle Confidential – Restricted
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
To bypass security
and provide access
Enables access in
the name of a user
Which is 42% of all
data attacks
Lost, stolen or weak
credentials
SQL-Injection
attacks
Backdoor attacks
Source: CSO Online MarketPulse, 2013
9Oracle Confidential – Restricted
From 2007 to 2013 the increase of hacking was
1600 %
50%
19%
13%
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Kurs: Oracle Database 12c: Security
Oracle Confidential – Internal/Restricted/Highly Restricted 10
Oracle Database 12c: Security
5-Tages-Klassenraumkurs
bei ETC
Start:
• MO 20. Juni 2016
• MO 01. Aug 2016
• tbd…
Auch als
• Private Event od.
• Live Virtual Classroom od.
• Training on Demand
verfügbar.
Trainer:
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Q&A
Oracle Confidential – Internal/Restricted/Highly Restricted 11 Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
A New Hacker Economy
Oracle Confidential – Internal/Restricted/Highly Restricted 12
A Global Market for stolen Data
HaaS (Hacking as a Service)
Online Tutorials
Point&Click Tools
Virus / RootKit Developer Kits
Distributed Denial of Service DDoS for hire$2 / hour
Rent a Botnet for some $100++Pricelist for stolen Information Price per Record
Fresh credit card data $20-25
Stale credit card data $2-7
Medical record $50
Hijacked email account $10-100
Bank account credentials $10-1000
EU Datenschutzverordnung 5/3/2016
3
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Database 12c(Cyber-)Security
Oracle Confidential – Internal/Restricted/Highly Restricted 13
click me
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Database 12c(Cyber-)Security
Oracle Confidential – Internal/Restricted/Highly Restricted 14
Oracle Database 12c: Security
Using Oracle Database Vault with Oracle Database 12c
Oracle Audit Vault and Database Firewall: Install & Configure
Oracle Audit Vault and Database Firewall: Policies & Reports
Using Oracle Key Vault
5 days ILT/TOD/LVC
2 days TOD
2 days TOD
2 days TOD
1 day TOD
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Confidential – Internal/Restricted/Highly Restricted 15
(Cyber-)SecurityMiddleWare
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle SecurityOracle University Offering
Oracle Confidential – Internal/Restricted/Highly Restricted 16
• Different Oracle University Courses
regarding Security
• Different Versions
• Different Formats
35
Oracle University Training Offering
-Security- • Different Streams Titles
• Middleware Security68• Different Streams Titles
• Database Security40• Different Certifications
3
• Different Cloud Subscription
Security Titles7+
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle DB SecurityOracle University Offering
Oracle Confidential – Internal/Restricted/Highly Restricted 17
• Different Course Titles
Database Security5
• Different Streams Titles
Database Security48• Database Security
Certification1
Oracle University Training Offering
-Database Security-
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Database Security Solutions
Masking & SubsettingMasking & Subsetting
Privileged User ControlsPrivileged User Controls
Encryption & RedactionEncryption & Redaction
PREVENTIVEPREVENTIVE
Activity MonitoringActivity Monitoring
Database FirewallDatabase Firewall
Auditing & ReportingAuditing & Reporting
DETECTIVEDETECTIVE ADMINISTRATIVEADMINISTRATIVE
Privilege & Data DiscoveryPrivilege & Data Discovery
Configuration ManagementConfiguration Management
Key & Wallet ManagementKey & Wallet Management
18