You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: security/ciso-office/README.md
+43-14Lines changed: 43 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
-
# CISO Office
1
+
# Field CISO Specialists
2
2
3
-
The CISO office group under Technology Engineering Security Specialists team is repsonsible to build trusted relationships with customer CISO team to help buildand define their cybersecurity strategy, help how Oracle can assist in their cybersecurity priorities. In addition, the team also advises on OCI Security first design principles and how shared security management model can help them achieve security posture management to improve security resilience.
3
+
The Field CISO Specialists team is repsonsible to build trusted relationships with customer CISO and IT Security team to help build, define and review their cybersecurity strategy to align with their business objectives. In addition, the team also advises on OCI Security first design principles and how shared security management model can help them achieve security posture management to improve security resilience. Key responsibliies not limited to below
-[Approaching Zero Trust Security with Oracle Cloud Infrastructure](https://www.oracle.com/a/ocom/docs/whitepaper-zero-trust-security-oci.pdf)
23
-
- How Oracle Cloud Infrastructure can help organizations adopt a Zero Trust Security model as recommended by the UK National Cyber Security Centre’s 8 principles
22
+
-[Quick tip 10: MFA user enrollment status within OCI IAM](https://blogs.oracle.com/cloudsecurity/post/quick-tip-10-mfa-user-enrollment-status-within-oci-iam)
23
+
- In this quick tip, we look at various options for how you can report on which users have enrolled for MFA within your tenancy.
24
+
25
+
-[Quick tip 9: My sign-on policy denies access. Help!](https://blogs.oracle.com/cloudsecurity/post/quick-tip-9-my-signon-policy-denies-access-help)
26
+
- This blog post looks at what you can do if you make changes to your sign-on policies and lock yourself out of your OCI IAM identity domain.
27
+
28
+
-[Quick tip 8: Managing authentication through sign-on policies](https://blogs.oracle.com/cloudsecurity/post/quick-tip-8-managing-authentication-through-signon-policies)
29
+
- This blog post looks at Sign-on policies and how users are challenged to authenticate.
30
+
31
+
-[A huge step forward for Security Zones in Oracle Cloud Infrastructure](https://blogs.oracle.com/cloudsecurity/post/a-huge-step-forward-for-security-zones-in-oci)
32
+
- This blog post will examine changes to customise security recipe for a security zone and help you to understand the benefits that the new approach has.
33
+
34
+
-[Native Cloud Security Services or Heterogeneous Tools?](https://blogs.oracle.com/cloudsecurity/post/native-cloud-security-services-or-heterogeneous-tools)
35
+
- This blog post examines the common question of Should you use existing security tools, which can monitor all your different cloud environments, not just OCI, or should you use OCI-native security services?
24
36
25
-
### Oracle Webinars
37
+
##Cloud Coaching Webinars
26
38
39
+
-[Security-First approach for your OCI Tenancy](https://www.youtube.com/watch?v=ZB87VUcK6Tg)
40
+
- Watch this webinar to learn about the top security misconfigurations organizations should avoid when using cloud services and follow the Oracle Cloud Infrastructure Security Best practices!
41
+
42
+
-[Securely Run and Optimize Oracle Workloads](https://community.oracle.com/customerconnect/events/604745-oci-securely-run-and-optimize-oracle-workloads)
43
+
- Watch this webinar to learn Oracle-recommended best practices as a secure foundation for every OCI implementation. The best practices apply to both new and existing OCI tenancies and should be implemented in addition to workload-related security requirements
- In this session, you will see how Oracle’s Identity and Access Management cloud services will enable you to accelerate the development and deployment of your applications to Oracle Cloud Infrastructure by taking advantage of an enterprise-class identity management service built on open standards.
47
+
48
+
-[OCI Monitoring Integration with 3rd party SIEM](https://www.youtube.com/watch?v=UPdPZPWOZIs)
49
+
- In this session, you will see how to integrate your existing SIEM with the OCI Monitoring Capabilities following a well-known pattern.
50
+
51
+
-[Myth #3 My workload is too sensitive to put into the Public Cloud](https://go.oracle.com/LP=133641?elqCampaignId=372556)
52
+
- In this third episode, we will cover: Oracle’s approach to security within OCI and Adopting a zero-trust security model as recommended by industry compliance standards
53
+
27
54
-[Oracle Espresso - Be More Resilient Against Ransomware Attacks](https://go.oracle.com/LP=114881?elqCampaignId=312068#On-Demand-Webinars)
28
55
- The webinar adresses a number of design architectures, best practices, automation tooling, and services for your inspiration and consideration. Let us show you how to become more resilient in a systematic and consistent way.
29
56
-[Cybersecurity First: why Security is better in the cloud](https://go.oracle.com/LP=122806?)
30
57
- Join us to hear from Oracle Security expert, how your solutions could benefit from OCI built-in security.
31
58
-[OCI Tech Talk - OCI Strategy Update and Security Deep Dive](https://videohub.oracle.com/media/t/1_s6juw6by)
32
59
- Watch this webinar as the Oracle experts will briefly go through some of the latest updates of OCI, before going in depth into the security topic. Oracle believes security should be foundational and built-in, and customers shouldn’t be forced to make tradeoffs between security and cost.
33
60
34
-
35
-
## Useful Links
61
+
## Oracle Live Labs
62
+
63
+
-[Security workshop for ORDS Deployment](https://apexapps.oracle.com/pls/apex/r/dbpm/livelabs/run-workshop?p210_wid=3338&p210_wec=&session=107996902425576)
64
+
- This hands-on workshop lab will help you understand how to setup a standalone ORDS (Oracle REST Data Services) server on OCI in a secure way, protecting all the resources involved through bastion services, private end-point ADB-S database, API Gateway and monitoring with Oracle Data Safe.
65
+
66
+
# Useful Links
36
67
37
68
-[Business Report: The mission of the Cloud-Centric CISO](https://www.oracle.com/a/ocom/docs/cloud/mission-of-the-cloud-centric-ciso-report.pdf)
38
69
- Uncovering the Cyberleader Priorities and Challenges from the Oracle and KPMG Cloud Threat Report
39
-
-[Cloud security trends to safeguard your enterprise](https://www.oracle.com/security/cloud-security/what-is-cloud-security/security-trends/)
40
-
- This ebook explores trends in how some organizations are using cloud services to address security challenges and provides ideas for how IT and security leaders can simplify and strengthen their security posture
- Contains a range of useful documents and links to various security, privacy, and compliance resources. Includes links to monitor the availability of Oracle Cloud.
- Protect your most valuable data in the cloud and on-premises with Oracle’s security-first approach. Oracle has decades of experience securing data and applications; Oracle Cloud Infrastructure delivers a more secure cloud to our customers, building trust and protecting their most valuable data.
- Oracle is committed to helping customers operate globally in a fast-changing business environment and address the challenges of an ever more complex regulatory environment.
74
+
-[Incorporate Cyber-Resilience Capabilities Into Your OCI Tenancy](https://docs.oracle.com/en/solutions/oci-tenancy-cyber-resilience-architecture/plan1.html#GUID-EA9C17F4-BBB0-4D16-A2B8-D55EF7741BC2)
75
+
- Refer to this article to learn about Cyber-Resilience capabilities in OCI
0 commit comments