The Data Opportunity: Using data for economic and social benefit reaping the

Similar documents
Oracle Identity & Access Management

SOLUTION BRIEF RSA IDENTITY GOVERNANCE & LIFECYCLE SOLUTION OVERVIEW ACT WITH INSIGHT TO DRIVE INFORMED DECISIONS TO MITIGATE IDENTITY RISK

Oracle Cloud Blueprint and Roadmap Service. 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

DLT AnalyticsStack. Powering big data, analytics and data science strategies for government agencies

Compliance Management Solutions from Novell Insert Presenter's Name (16pt)

SAP Road Map for Governance, Risk, and Compliance Solutions

Trusted by more than 150 CSPs worldwide.

SAP Product Road Map SAP Identity Management

Integrated Social and Enterprise Data = Enhanced Analytics

Fulfilling CDM Phase II with Identity Governance and Provisioning

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Extending Enterprise to the Edge

Cisco Intelligent Automation for Cloud

Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Infor Risk and Compliance for CDM Phase 2: Automate, integrate, manage, and report across your enterprise

Prepare for GDPR today with Microsoft 365

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

Lenovo Services for the Data Center

RSA ARCHER IT & SECURITY RISK MANAGEMENT

IBM BPM on zenterprise

SOLUTION BRIEF EU GENERAL DATA PROTECTION REGULATION COMPLIANCE WITH RSA ARCHER

Control Anything. Gain Insights. Connect Things. Action. 10% of the data on earth will come from IoT by B connected devices by 2020

Symantec ediscovery Platform, powered by Clearwell

PORTFOLIO MANAGEMENT Thomas Zimmermann, Solutions Director, Software AG, May 03, 2017

BMC - Business Service Management Platform

Oracle Product Hub Cloud

JD Edwards EnterpriseOne Mobile Solution Strategy

Why You Should Take a Holistic Approach

Strengthen Every Link in Your Digital Supply Chain

Oracle s Integration Strategy

Azure IoT Suite. Secure device connectivity and management. Data ingestion and command + control. Rich dashboards and visualizations

Workspace ONE. Insert Presenter Name. Empowering a Digital Workspace. Insert Presenter Title

ORACLE ADVANCED ACCESS CONTROLS CLOUD SERVICE

CHOOSE THE RIGHT IDENTITY & ACCESS MANAGEMENT SOLUTION

JD EDWARDS. Drive Digital Transformation with the Internet of Things

PORTFOLIO AND TECHNOLOGY DIRECTION ARMISTEAD SAPP & RANDY GUARD

Alessandra Brasca Il p unto di vista I BM B

Industrial Connected Product Solutions

Where Do You Start? Mobile Device and Application Management

Understanding Your Enterprise API Requirements

Limitless Creativity in the Cloud

Evolving Your Infrastructure to Cloud

PREVENT MAJOR DATA BREACHES WITH THREAT LIFECYCLE MANAGEMENT Seth Goldhammer, Senior Director of Product Management at LogRhythm

The Key to Successful Business Transformation

Find the Information That Matters. Visualize Your Data, Your Way. Scalable, Flexible, Global Enterprise Ready

Landscape Deployment Recommendations for SAP Assurance and Compliance Software for SAP S/4HANA. SAP SE November 2017

Infor SunSystems. Grow with flexibility. Integrate

IBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights

Microsoft FastTrack For Azure Service Level Description

I D C M A R K E T S P O T L I G H T. S i l o s a n d Promote Business Ag i l i t y

Forum TIC Transporte. Enrique Martín Casado Director Preventa Tecnología

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

ORACLE ADVANCED FINANCIAL CONTROLS CLOUD SERVICE

Less Complexity More Agility Ready for the future with innovative technologies

Identity Management Solutions for Oracle E-Business Suite. An Oracle White Paper January 2008

Secure information access is critical & more complex than ever

SAS ANALYTICS IN ACTION APPROACHABLE ANALYTICS AND DECISIONS AT SCALE TUBA ISLAM, SAS GLOBAL TECHNOLOGY PRACTICE, ANALYTICS

White paper Accelerating the Digital Transformation With Atos alien4cloud and Cloudify

SOLUTION BRIEF HELPING PREPARE FOR RISK ASSESSMENT & COMPLIANCE CHALLENGES FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

An all-in-one risk management platform delivering fraud detection, transactions screening and customer due diligence capabilities

SOLUTION BRIEF CA MANAGEMENT CLOUD FOR MOBILITY. Overview of CA Management Cloud for Mobility

ORACLE KNOWLEDGE 8.5 RELEASE - PRODUCT SUMMARY OVERVIEW

Leverage T echnology: July 19 th, 2013 Adil Khan. Move Your Business Forward. Copyright. Fulcrum Information Technology, Inc.

Closed-loop Performance Management

API Gateway Digital access to meaningful banking content

Enabling Asset Integrity Management for the Oil & Gas Industry

Financial Services Compliance

Developing Connected Products - What s needed? Driven to enable your success!

Believe in a higher level of IT Security SECUDE Business White Paper. How to Improve Business Results through Secure Single Sign-on to SAP

ITIL Asset and Configuration Management in the Cloud. January 2017

Driving Greater ROI From ITSM with The Future of SAM. Martin Prendergast, CEO Concorde

<Insert Picture Here> Externalizing Identity

Identity Governance and Administration

Oracle Process Cloud Service

At the Heart of Connected Manufacturing

BUYER S GUIDE: CUSTOMER IDENTITY & ACCESS MANAGEMENT (CIAM)

Asset Performance Management from GE Digital. Enabling intelligent asset strategies to optimize performance

SAP Monitoring: Performance Management Your Business Can Count On

OS A superior platform for business. Operate seamlessly, automatically, and intelligently anywhere in the world

Achieving Operational Excellence with a Connected Mill

Solution Overview : The IBM Government Industry Framework

Service Catalog ATTOSOL TECHNOLOGIES.

Microsoft moves IT infrastructure management to the cloud with Azure

Cisco ONE Enterprise Cloud Suite Automates Infrastructure, Cloud, and Application Lifecycles

Enterprise Mobility Suite

ORACLE FUSION FINANCIALS CLOUD SERVICE

Aprimo Marketing Productivity

Aprimo Digital Asset Management

Veritas 360 Data Management Suite. Accelerating Digital Transformation Through Multi-Cloud Data Management.

Digital Transformation - What s Happening in Waste and Recycling Tech, Software, Cloud, Data, Mobile & Analytics?

Oracle Application Integration Architecture Mission Critical SOA Governance

How to become a Digital Predator

2018 SPRING PRODUCT UPDATE. What s New in Oracle HCM Cloud

Build a private PaaS. With Red Hat CloudForms and JBoss Enterprise Middleware. DLT Solutions 2411 Dulles Corner Park, Suite 800 Herndon, VA 20171

CIP 2017 Project Outline

SYSPRO Product Roadmap Q Version 03

The Future of Workload Automation in the Application Economy

Transcription:

<Insert Picture Here> The Data Opportunity: Using data for economic and social benefit reaping the benefits while addressing the challenges. Joseph Alhadeff/Vice President Global Public Policy, Chief Privacy Strategist Victoria Privacy and Security Conference 2016

Are You Capitalizing on the Data Opportunity? 2

(Don t just assemble information, take advantage of it) 3

Data-Driven Innovation People think we got big by putting stores in small towns. Really we got big by replacing inventory with Information. Sam Walton http://www.slideshare.net/monicamishra10/walmart-value-chainanalysis 4

Creating Unique Data-Driven Value In A Unique Way Datafy More Activities Create Proprietary Data Assets Use Data To Make Data Achieve Network Effects 5

Data Liquidity DATA CAPITAL CHANGE THE BUSINESS RUN THE BUSINESS 6

Enterprise Big Data Architecture Discover And Predict, Fast BIG DATA ANALYTICS BIG DATA APPLICATIONS Accelerate Data- Driven Action DATA CAPITAL Simplify Access To All Data BIG DATA MANAGEMENT BIG DATA INTEGRATION Connect And Govern Any Data Copyright Copyright 2015, Oracle 2014 Oracle and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. 7

What is the value of data in context and application Do you base your trust just on the sign? 8

On Premises Cloud Public Cloud Hybrid Cloud Software Algorithms Analytics Applications Platform Data Lake Data Warehouse Data Factory Data Lab Infrastructure Hyper-Converged Compute, Storage, Network 9

How to use data to drive organizational change Understand the objective, it s benefits and risks 10

Your operational challenges Deliver new and better services Cut service costs and optimise budgets Improve staff development and morale Comply with E-Gover nment policy 11

Addressing those challenges Flexible processes to deliver new services quickly Streamline processes to reduce service cost Empower staff to improve efficiency and morale Improve operational insight to drive good governance 12

Challenges Fragmented Solutions Poor Digital Experience TCO = Value Onerous security implementation Lack of integrated and closed loop processes Lack of accountability Loss of business opportunity Poor UX across channels Static security model Integration and support Time to value Future scale in question 13

Solutions and Connecting the Customer Experience Storefront Experience Merchandising Sales automation Territory and quota Partner management Commerce Sales Marketing Data management Cross-channel Individual campaigns Content One integrated platform Engage candidates for future needs to best serve customers Modern HR Service CPQ Configure Price Quote Knowledge management Cross-channel contact Field service Copyright Copyright 2015, Oracle 2015 Oracle and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. 14

Providing the Platform of Change DATA MANAGMENT MOBILE ANALYTICS COLLABORATION SECURITY INTEGRATION CUSTOM APP Copyright Copyright 2015, Oracle 2015 Oracle and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. 15

Example of Integrated Process Pilot/airline approves Repairs scheduled when plane lands on tarmac Airplane detects A/C malfunction: Determines 45- minute delay to fix Passengers notified to arrive 45 minutes later Airlines alerts all technicians to check A/C units for similar planes

Data drives Smart Cities

Solution for Cities That Want to Become Smart Integrated multi-channel services (self-service web/chat, email, local single number) delivery platform for 90%+ resolution of most government service requests ENGINE Analytics for continuous improvement of service delivery, which services to prioritize, extend, consolidate or even discontinue COCKPIT Modernize IT infrastructure to enable integration and interoperability with the city s existing siloed legacy IT infrastructure to enhance service delivery capability Fuselage 18

Where do you need to improve? Meet key objectives and targets Measure performance against objectives and targets Enable citizens to help themselves Deliver seamless service across channels Remove service bottlenecks Understand and control the cost of service delivery Better access to information for staff and citizens Motivate staff to improve service levels and morale 19

Information Age Applications for Smart Cities 6 Human Resources 1 External Groups 7 Financial Administration 0 Constituents 5 City Administration 8 Analytics 2 Single Point Of Access 3 City Operations 9 Governance, Risk & Compliance 4 City Infrastructure 10 IT Shared Services 20

Nervous System Smart Cities are more than arrays of linked sensors; they are like an organism's nervous system an ecosystem that collects information across a variety of sources and processes it for multiple uses including making inferences from information and developing derivative as well as new information from those sources. 21

Data Driven Intelligence Governments and the Private Sector use data to drive their missions and need to overcome many of the same challenges Data is the connective tissue for reliable, timely, and integrated Intelligence Data has inherent value and when combined with other data New intelligence is the result of combining and linking this data together Must meet the demand of the data growth, analysis and actionable results Need to empower analysts, developers and data scientist to explore, test and evaluate with ease and speed Must address the complex legal, commercial, and privacy rights issues governing data usage 22

The Security and Privacy Paradigm Privacy and security are closely related and context dependent. Security is closer to an absolute with variance in risk tolerance where privacy is more subjective in personal definition and application. Both concepts are screaming stop and walk away

Not just more security, adaptive security Security that can dynamically adapt to shifting context and risk Driven from the data layer and leveraged across the stack While relying on integrated identity management Supported by access controls, audit and real time notification

Risk-Aware Security Secure Login Model Risk Fraud Prevention Analysis and Forensics Detect Anomalies Evaluate transactions Challenge or Block Username and password are correct but is this really Mary? Is Mary doing anything suspicious? Can Mary answer a challenge if the risk is high enough?

Real-Time Identity Theft + Fraud Prevention Users Merchants Location User Device What A User Knows Challenge Questions) What A User Has (Device Fingerprinting) What a User Does (Behavior Pattern + Profiling) Adaptive Access Control (Pin, Password, Portals Business Applications Where a User Is (Geo-Location) Admins Custom Applications 26

Real-Time Identity Theft + Fraud Prevention Users Allow Portals Computed Risk Score Block Challenge Merchants Alert Business Applications Admins Custom Applications 27

Oracle Identity Management Secure Hybrid Identity Solution Leverage security investment Manage cloud/enterprise access Address regulatory compliance Securing Digital Transformation Enable digital business Multi-channel user experience Contextual risk-aware security Open, Scalable and Agile Rapid time-to-value Cloud architecture scale Standards and APIs 28

Enterprise Cloud Mobile DIRECTORY: Consolidating Authoritative Sources ACCESS: Attribute Based Access Control and UAAS Federation IDENTITY MANAGEMENT EVOLUTION GOVERNANCE: Enforcing Least Privilege and Addressing the Insider Threat

Current Community Challenges Authorization Beyond Identities & Roles Address the Insider Threat Extend Security Infrastructure to Remote Sites Ensure Alignment with Community Cloud

How Can These Challenges Be Addressed? Fine Grained Access with ABAC Profile and Behavior-based Access Leverage UAAS Federation and Attribute Sharing Employ Industry Vetted Security Standards and APIs

Protect Databases from Attacks Users Data Redaction dob:xx/xx/xxxx ssn:xxx-xx-4321 Dev/Test Partners, BI CX App Applications Privileged Privileged Users User DB Controls Access denied Date of Birth SSN Key Vault Data Encryption *7#$%!!@!%afb ##<>*$#@34 Data Subsetting Region, Year Size-based Data Masking dob: 12/01/1987 xxxxxxxxxx 11/05/1999 Key Vault 32

Audit, Monitor, and Detect Users Database Firewall! SYBASE Applications Network Events Alerts! Audit Data Reports Policies Audit Vault Audit Data, Event Logs 33

Security From The Ground Up SECURITY INSIDE OUT Security close to the data eliminates guesswork, maximizes performance with application transparency DEFENSE IN DEPTH Layered overlapping controls with encryption, masking, auditing, monitoring, access control, redaction, ENTERPRISE SCALE DEPLOYMENTS Across multiple systems: operating systems, heterogeneous databases, applications, CONTINUOUS INNOVATIONS Transparent Data Encryption, DBA Control, Redaction, Privilege Analysis, DB Firewall, RAS, Cloud, 34

Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management

Address Cloud Database Security Challenges Risks for Databases in Cloud Sensitive data exposure on test/dev/partner Loss of clear-text data Block access to encryption keys Block access by the cloud DBAs Monitor Database activity Risk Mitigation Mask and subset before moving to cloud Encrypt data by default Control keys with on-premise Key Vault Restrict DBA access with Database Vault Audit and monitor with on-premise Audit Vault and Database Firewall Maintain Control and Visibility * Work in Progress 36

First, know your own system some highlights Identify business goals and objectives Understand and optimize processes and workflows for the applicable operational and technological environment Generally understand the nature of the data and the resulting risk both to the enterprise and the end user/data subject of a compromise of the data Associate roles and privileges to those persons who will access data and assure that they are trained and accurately maintain roles and privileges as they change and apply appropriate separation of duties Identify risks/threats, determine acceptable risk and mitigate risk to acceptable levels Security lifecycle management, training, incidence response, business continuity 37