|
1 |
| -# CISO Office |
| 1 | +# Field CISO Specialists |
2 | 2 |
|
3 |
| -The CISO office group under Technology Engineering Security Specialists team is repsonsible to build trusted relationships with customer CISO team to help build and define their cybersecurity strategy, help how Oracle can assist in their cybersecurity priorities. In addition, the team also advises on OCI Security first design principles and how shared security management model can help them achieve security posture management to improve security resilience. |
| 3 | +The Field CISO Specialists team is responsible for building trusted relationships with customer CISO and IT Security team to help build, define, and review their cybersecurity strategy to align with their business objectives. In addition, the team also advises on OCI Security's first design principles and how the shared security management model can help them achieve security posture management to improve security resilience. Key responsibilities not limited to the below |
4 | 4 |
|
5 | 5 | - Executive Influence - Build Trusted Relationship
|
6 | 6 | - Avoid Business risk with Cybersecurity management
|
7 | 7 | - Embrace Zero Trust
|
8 | 8 | - Reduce risk, Incident response, Resiliency and Optimize costs
|
9 |
| -- Adopt OCI to meet their compliance needs with securely build and operated workloads |
| 9 | +- Adopt OCI to meet their compliance needs with securely built and operated workloads |
10 | 10 |
|
| 11 | +Reviewed: 02.02.2024 |
11 | 12 |
|
12 | 13 | # Table of Contents
|
13 | 14 |
|
14 | 15 | 1. [Team Publications](#team-publications)
|
15 | 16 | 2. [Useful Links](#useful-links)
|
16 |
| -3. [Reusable Assets Overview](#reusable-assets-overview) |
| 17 | + |
17 | 18 |
|
18 |
| -## Team Publications |
| 19 | +# Team Publications |
19 | 20 |
|
20 |
| -### Oracle Whitepaper |
| 21 | +## Oracle Blogs |
21 | 22 |
|
22 |
| -- [Approaching Zero Trust Security with Oracle Cloud Infrastructure](https://www.oracle.com/a/ocom/docs/whitepaper-zero-trust-security-oci.pdf) |
23 |
| - - How Oracle Cloud Infrastructure can help organizations adopt a Zero Trust Security model as recommended by the UK National Cyber Security Centre’s 8 principles |
| 23 | +- [Quick tip 10: MFA user enrollment status within OCI IAM](https://blogs.oracle.com/cloudsecurity/post/quick-tip-10-mfa-user-enrollment-status-within-oci-iam) |
| 24 | + - In this quick tip, we look at various options for how you can report on which users have enrolled for MFA within your tenancy. |
| 25 | + |
| 26 | +- [Quick tip 9: My sign-on policy denies access. Help!](https://blogs.oracle.com/cloudsecurity/post/quick-tip-9-my-signon-policy-denies-access-help) |
| 27 | + - This blog post looks at what you can do if you make changes to your sign-on policies and lock yourself out of your OCI IAM identity domain. |
| 28 | + |
| 29 | +- [Quick tip 8: Managing authentication through sign-on policies](https://blogs.oracle.com/cloudsecurity/post/quick-tip-8-managing-authentication-through-signon-policies) |
| 30 | + - This blog post looks at Sign-on policies and how users are challenged to authenticate. |
| 31 | + |
| 32 | +- [A huge step forward for Security Zones in Oracle Cloud Infrastructure](https://blogs.oracle.com/cloudsecurity/post/a-huge-step-forward-for-security-zones-in-oci) |
| 33 | + - This blog post will examine changes to customize a security recipe for a security zone and help you understand the benefits that the new approach has. |
| 34 | + |
| 35 | +- [Native Cloud Security Services or Heterogeneous Tools?](https://blogs.oracle.com/cloudsecurity/post/native-cloud-security-services-or-heterogeneous-tools) |
| 36 | + - This blog post examines the common question of whether should you use existing security tools, which can monitor all your different cloud environments, not just OCI, or should you use OCI-native security services. |
24 | 37 |
|
25 |
| -### Oracle Webinars |
| 38 | +## Cloud Coaching Webinars |
26 | 39 |
|
| 40 | +- [Security-First approach for your OCI Tenancy](https://www.youtube.com/watch?v=ZB87VUcK6Tg) |
| 41 | + - Watch this webinar to learn about the top security misconfigurations organizations should avoid when using cloud services and follow the Oracle Cloud Infrastructure Security Best practices! |
| 42 | + |
| 43 | +- [Securely Run and Optimize Oracle Workloads](https://community.oracle.com/customerconnect/events/604745-oci-securely-run-and-optimize-oracle-workloads) |
| 44 | + - Watch this webinar to learn Oracle-recommended best practices as a secure foundation for every OCI implementation. The best practices apply to both new and existing OCI tenancies and should be implemented in addition to workload-related security requirements |
| 45 | + |
| 46 | +- [Offloading Oracle Identity Management](https://www.youtube.com/watch?v=MdA_M2JnoxM) |
| 47 | + - In this session, you will see how Oracle’s Identity and Access Management cloud services will enable you to accelerate the development and deployment of your applications to Oracle Cloud Infrastructure by taking advantage of an enterprise-class identity management service built on open standards. |
| 48 | + |
| 49 | +- [OCI Monitoring Integration with 3rd party SIEM](https://www.youtube.com/watch?v=UPdPZPWOZIs) |
| 50 | + - In this session, you will see how to integrate your existing SIEM with the OCI Monitoring Capabilities following a well-known pattern. |
| 51 | + |
| 52 | +- [Myth #3 My workload is too sensitive to put into the Public Cloud](https://go.oracle.com/LP=133641?elqCampaignId=372556) |
| 53 | + - In this third episode, we will cover: Oracle’s approach to security within OCI and Adopting a zero-trust security model as recommended by industry compliance standards |
| 54 | + |
27 | 55 | - [Oracle Espresso - Be More Resilient Against Ransomware Attacks](https://go.oracle.com/LP=114881?elqCampaignId=312068#On-Demand-Webinars)
|
28 |
| - - The webinar adresses a number of design architectures, best practices, automation tooling, and services for your inspiration and consideration. Let us show you how to become more resilient in a systematic and consistent way. |
| 56 | + - The webinar addresses a number of design architectures, best practices, automation tooling, and services for your inspiration and consideration. Let us show you how to become more resilient in a systematic and consistent way. |
29 | 57 | - [Cybersecurity First: why Security is better in the cloud](https://go.oracle.com/LP=122806?)
|
30 | 58 | - Join us to hear from Oracle Security expert, how your solutions could benefit from OCI built-in security.
|
31 | 59 | - [OCI Tech Talk - OCI Strategy Update and Security Deep Dive](https://videohub.oracle.com/media/t/1_s6juw6by)
|
32 |
| - - Watch this webinar as the Oracle experts will briefly go through some of the latest updates of OCI, before going in depth into the security topic. Oracle believes security should be foundational and built-in, and customers shouldn’t be forced to make tradeoffs between security and cost. |
| 60 | + - Watch this webinar as the Oracle experts will briefly go through some of the latest updates of OCI, before going in-depth into the security topic. Oracle believes security should be foundational and built-in, and customers shouldn’t be forced to make tradeoffs between security and cost. |
33 | 61 |
|
34 |
| - |
35 |
| -## Useful Links |
| 62 | + ## Oracle Live Labs |
| 63 | + |
| 64 | +- [Security workshop for ORDS Deployment](https://apexapps.oracle.com/pls/apex/r/dbpm/livelabs/run-workshop?p210_wid=3338&p210_wec=&session=107996902425576) |
| 65 | + - This hands-on workshop lab will help you understand how to set up a standalone ORDS (Oracle REST Data Services) server on OCI in a secure way, protecting all the resources involved through bastion services, private end-point ADB-S database, API Gateway, and monitoring with Oracle Data Safe. |
| 66 | + |
| 67 | +# Useful Links |
36 | 68 |
|
37 | 69 | - [Business Report: The mission of the Cloud-Centric CISO](https://www.oracle.com/a/ocom/docs/cloud/mission-of-the-cloud-centric-ciso-report.pdf)
|
38 | 70 | - Uncovering the Cyberleader Priorities and Challenges from the Oracle and KPMG Cloud Threat Report
|
39 |
| -- [Cloud security trends to safeguard your enterprise](https://www.oracle.com/security/cloud-security/what-is-cloud-security/security-trends/) |
40 |
| - - This ebook explores trends in how some organizations are using cloud services to address security challenges and provides ideas for how IT and security leaders can simplify and strengthen their security posture |
41 | 71 | - [Oracle Trust Center](https://www.oracle.com/trust/)
|
42 | 72 | - Contains a range of useful documents and links to various security, privacy, and compliance resources. Includes links to monitor the availability of Oracle Cloud.
|
43 |
| -- [Oracle Security](https://www.oracle.com/security/) |
44 |
| - - Protect your most valuable data in the cloud and on-premises with Oracle’s security-first approach. Oracle has decades of experience securing data and applications; Oracle Cloud Infrastructure delivers a more secure cloud to our customers, building trust and protecting their most valuable data. |
45 | 73 | - [Oracle Cloud Compliance](https://www.oracle.com/corporate/cloud-compliance/)
|
46 | 74 | - Oracle is committed to helping customers operate globally in a fast-changing business environment and address the challenges of an ever more complex regulatory environment.
|
| 75 | + - [Incorporate Cyber-Resilience Capabilities Into Your OCI Tenancy](https://docs.oracle.com/en/solutions/oci-tenancy-cyber-resilience-architecture/plan1.html#GUID-EA9C17F4-BBB0-4D16-A2B8-D55EF7741BC2) |
| 76 | + - Refer to this article to learn about Cyber-Resilience capabilities in OCI |
47 | 77 |
|
48 | 78 | # License
|
49 | 79 |
|
|
0 commit comments