| Daily headlines remind us how security and regulatory breaches can disrupt and irreparably damage businesses. Security is critical to ensuring business continuity and managing risks for increased efficiency and strategic growth. In March 2011, Oracle held a Chief Security Officer Summit for chief information security officers and chief security officers. The presentations at the summit were designed to help them overcome the historical notion of perimeter security, with its network firewalls, email gateways, and anti-virus solutions. The notion of perimeter is no longer relevant in an era of pervasive external-facing applications, cloud computing services, and outsourcing. Today's security executive needs to adopt a "Security Inside Out" approach, where information assets are protected all the way from databases to applications to end points. Below are the recorded presentations:  | Security Point of View from the Top Security Point of View from the Top Mark Hurd, President, Oracle (bio) |  | The Psychology of Security The Psychology of Security Bruce Schneier, Chief Security Officer of BT (bio) |  | CSO Perspectives: Fireside Chat with Oracle CSO CSO Perspectives: Fireside Chat with Oracle CSO Mary Ann Davidson, Chief Security Officer, Oracle; Roxana Bradescu, Director, Database Security, Oracle (bio) |  | Lessons Learned from the 2010 Data Breach Investigations Report Lessons Learned from the 2010 Data Breach Investigations Report Bryan Sartin, Vice President, Investigative Response, Verizon Business (bio) |  | Security Best Practices – A Customer Perspective Security Best Practices – A Customer Perspective David Solo, Director, Information Security Architect and Strategy, Citigroup; Gene Sun, V.P. Information Security, FedEx Corporation (bio); Dennis Brixius, V.P., Risk Management and Chief Security Officer, The McGraw-Hill Companies |  | Think Your Data is Secure? Think Again. Think Your Data is Secure? Think Again. Vipin Samar, Vice President, Database Security Product Development, Oracle (bio) |  | An Entitlements Centric Approach to Compliance An Entitlements Centric Approach to Compliance Nishant Kaushik, Chief Identity Strategist, Oracle (bio) |  | Security Inside Out Security Inside Out Amit Jasuja; Vice President, Identity Management Product Development, Oracle (bio) | | |