Bulletproof Your Business

Bulletproof Your Business

Fraud, Security, Compliance

A security breach can undermine the integrity and future of your business. And it can strike from anywhere with little warning.

Learn from the experts how to shape a security strategy that applies artificial intelligence and predictive analytics to keep your company secure, in compliance, and one step ahead of the bad guys.

  • Assess your security position by understanding the top threats that face your business sector.
  • Learn how current and upcoming regulations will affect your data security operations and how to stay in compliance.
  • Discover how the right security controls can continually assess, detect, and prevent fraud and data breaches.

Attend these sessions to help keep your business and your customers safe and build your best bulletproof business now.

 

Featured Sessions

  • Cloud Data Protection: Monitoring Crypto Key Admins with CASB

    When storing and encrypting sensitive data in the cloud, security and compliance go hand in hand. In this session we will demonstrate how to use CASB to monitor encryption key administrators activities so that compliance officers can determine compliance with corporate data protection policies and ensure remediation of any compliance violations. Attend this session to learn more.

    Eric Leach, Oracle

  • Adaptive Security in a Hybrid Cloud World

    In this session we will show how the adaptive security capabilities within the Oracle Security and Identity portfolio enables organizations to identify and mitigate security risks in real time by analyzing user behavior and leveraging security feeds from other products and platforms. Attendees will see how Oracle’s identity products can be used to identify risky behavior and make intelligent decisions about the types of authentication that are appropriate and required given that behavior. Attend this session to learn more.

    Eric Leach, Oracle

  • A CISO’s Path To Success in the Age of Cyber Security

    Many organizations struggle to mature their security and risk management capabilities as they leverage more and more cloud services. This session will address real world customer use cases, best practices, and technology usage for how CISOs are building and maturing their information security programs to address the proliferation of sensitive data in hybrid environments, regulatory compliance mandates, and the ever changing threat landscape. We’ll delve into what technologies are a must in the minds of the security executive, the challenges and pitfalls encountered, as well as the incremental successes achieved. Attend this session to learn more.

    Alice Wang, Oracle

  • Identity Cloud Services for Oracle Public Cloud

    In this session, we demonstrate how Oracle’s Trust Fabric leverages Identity Cloud Services to deliver secure access across Oracle SaaS, PaaS, and IaaS services. By using a common set of fundamental identity capabilities delivered as services, Oracle’s customers are able to achieve a more secure and seamless experience across for both end users and administrators. Attend this session to learn more.

    Eric Leach, Oracle

  • Oracle’s Trust Fabric: The Foundation for Identity-Centric Cybersecurity

    Today’s enterprise has to deal with modern threats and new attack vectors while driving IT modernization, cloud adoption, and digital transformation. Built on the industry’s first trust fabric for identity and security, Oracle introduces the principles of machine learning, artificial intelligence, and autonomous cyber resilience to help enterprises adapt and rapidly respond to the emerging threat landscape. This session provides an executive overview of Oracle’s vision and capabilities for modern identity-centric cybersecurity. Attend this session to learn more.

    Eric Olden, Oracle
    Rohit Gupta, Oracle

Browse the Sessions in the Content Catalog

Our Session Catalog provides an in depth look into our sessions at Oracle OpenWorld 2018.