《OCI 中的勒索软件防御:有效控制和策略 [PAN1807].pdf》由会员分享,可在线阅读,更多相关《OCI 中的勒索软件防御:有效控制和策略 [PAN1807].pdf(27页珍藏版)》请在三个皮匠报告上搜索。
1、 PAN1807-Defending Against Ransomware in OCIEffective Controls and StrategiesTal AltmanDirector,Network Specialists and Security ProgramsOracle North America CloudOctober 15,2025PresentersCopyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly Restricted2Tal AltmanDirecto
2、r,OCI Networking Specialists and Security Programs,OracleGary AskewField Chief Information Security Officer,OracleRajesh PhiliposDirector,Global Technology,TriNet USA,Inc.Mike BarnettPrincipal Program Manager,TriNet USA,Inc.Oracle AI World 25 Agenda title3Copyright 2025,Oracle and/or its affiliates|
3、Confidential:Internal/Restricted/Highly Restricted123Introducing OCI Cyber Resiliency ConceptsCyber Resiliency Architecture and AssessmentsTriNets Cyber Resiliency JourneyIntroduction to Cyber Resiliency ConceptsGary AskewCyber Resiliency and Disaster RecoveryAre Not the SameCyber Resiliency is not
4、just standard backup with DR.-It must include enhanced data integrity checking at each phase of the backup and recovery process.Assume Breach.-It must have enhanced“separation of duties”architected into the tech and process.-It must have administrative,logical and virtual physical(Administrative Air
5、gap)separation from the primary backup and recovery infrastructure.-Structured data must support single transaction level backup and recovery.-Recovery data must be accessible and leverage incremental recovery,based on RTO/RPO,to a protected environment that can be quickly built into an alternate pr
6、oduction site.5Copyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly RestrictedThe Cyber TriadCopyright 2025,Oracle and/or its affiliatesCyber SecurityDisaster RecoveryPowered ByCore Landing ZoneOCI MAP Foundations ProgramOCI CRA Foundations ProgramCyber ResilienceOCI F