le invitamos a unirse a este Webcast On Demand, donde podrá aprender de los especialistas las mejores prácticas en la seguridad de los datos para evitar su ex filtración por amenazas y abusos de privilegios.
Algunos de los temas que usted podrá escuchar son:
La Seguridad y la Privacidad de los Datos
Controles Preventivos (Encripción y Redacción, Enmascaramiento y Segmentación, Control de Usuarios Privilegiados, Seguridad en base a Etiquetas, Respaldos Seguros)
Controles Detectivos (Monitoreo, Auditoría y Firewall de Base de Datos)
Controles Administrativos (Descubrimiento y Clasificación de Datos Sensibles, Administración de llaves de Encripción, Administración de Privilegios, Administración de la Configuración)
Lo invitamos a registrarse en cualquier momento y lugar: dando click en el siguiente link:
Database Security Webcast On Demand
This is a Title Slide with Picture slide ideal for including a picture with a brief title, subtitle and presenter information.
To customize this slide with your own picture:
Right-click the slide area and choose Format Background from the pop-up menu. From the Fill menu, click Picture and texture fill. Under Insert from: click File. Locate your new picture and click Insert.
This is a Safe Harbor Front slide, one of two Safe Harbor Statement slides included in this template.
One of the Safe Harbor slides must be used if your presentation covers material affected by Oracle’s Revenue Recognition Policy
To learn more about this policy, e-mail: Revrec-americasiebc_us@oracle.com
For internal communication, Safe Harbor Statements are not required. However, there is an applicable disclaimer (Exhibit E) that should be used, found in the Oracle Revenue Recognition Policy for Future Product Communications. Copy and paste this link into a web browser, to find out more information.
http://my.oracle.com/site/fin/gfo/GlobalProcesses/cnt452504.pdf
For all external communications such as press release, roadmaps, PowerPoint presentations, Safe Harbor Statements are required. You can refer to the link mentioned above to find out additional information/disclaimers required depending on your audience.
This is a Remote Speaker Picture slide ideal for including a picture with the speaker’s name and title and company.
To Replace the Picture on this sample slide (this applies to all slides in this template that contain replaceable pictures)
Select the sample picture and press Delete. Click the icon inside the shape to open the Insert Picture dialog box. Navigate to the location where the picture is stored, select desired picture and click on the Insert button to fit the image proportionally within the shape.
Note: Do not right-click the image to change the picture inside the picture placeholder. This will change the frame size of the picture placeholder. Instead, follow the steps outlined above.
If you know both yourself and your enemy, you can win numerous (literally, "a hundred") battles without jeopardy
76% de las organizaciones no pueden prevenir que los DBA manipulen manejen los datos de las aplicaciones
Solo 27% puede detectar un cambio no autorizado en la base de datos
55% no monitorean cambios estructurales en la base de datos.
Organizations have not been doing enough and that is why we compliance measures, such as PCI DSS and the new version 3.0 requirements. In fact, looking at the numbers, we have lost over 11billion US dollars in 2012. And as you can see, the trend is getting worse. Organizations need to protect themselves.
Más del 70% de las personas encuestadas dicen que sus aplicaciones pueden ser hackeables vía Inyección de SQL
71% toman más de 3 meses para aplicar los parches de seguridad en los sistemas productivos.
Solo 31% monitorea quien esta leyendo los datos sensibles.
55% de las organizaciones no saben si las cuentas privilegiadas de las bases de datos están siendo mal utilizadas
60% no monitorea los cambios en los datos sensibles
42%dicen que no saben cuanto tardarían en detectar y corregir un cambio no autorizado en la base de datos.
The size of data breaches has grown exponentially from 136 reported data breaches and 53 million records in 2005, to over 600 data breaches and 250 million records breached in 2013 (Source: Privacy Rights Data Breach). Today, data breaches of 100 million records and more of personal identifiable information are more common.
One of the most concentrated areas of such sensitive data is the database. In fact Verizon highlights databases and file servers as having so much vaulable information and are regular targets for cybercriminals
And how do they access this data? Among the multiple approaches, using stolen credentials is the number one attack vector, because it is so successful
Alternatively, you can use 88% of insider misuse involves privilege abuse
According to studies, 1 in 500 phishing emails is successful. When criminals steal 100M personal records and launch a phishing attack, statistically 200,000 users will click on the email, which creates 200,000 more opportunities for additional viral breaches, identity theft, or direct organizational attacks.
To highlight the importance of databases, the Verizon report also highlights databases as THE second most common target of insiders. Again, this is because the main concentration of sensitive data is in the database.
Menos del 30% de los datos personales están cifrados dentro de las bases de datos.
Solo el 22% cifra (encripta) los respaldos de las bases de datos
75% de las empresas no cifra (encripta) el trafico
Solo el 22% de las empresas tienen un proceso para des identificar los datos
Casi 50% de las compañías usan datos productivos en ambientes de desarrollo y pruebas.