1、Enhance Fusion Cybersecurity&Breach Detection with AISid SinhaVP,Risk CloudFusion AppsOct15,20252Dave ClaytorDirector Enterprise Engineering,MetaDarren DuffySr Manager,Product&Engineering Finance,T-MobileSpeakersAgenda3Copyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/High
2、ly Restricted1234IntroductionMeta Case StudyT-Mobile Case StudyQ&AShift to cloud(&AI)is reshaping cybersecurityGlobal users,wider accessExpanding API and AI connectionsRapid,continuous updatesFocus on app data and configurations security4Copyright 2025,Oracle and/or its affiliates|Confidential:Inter
3、nal/Restricted/Highly RestrictedAttack surface area focused on the application layerCompared to on-prem,Business processes running on the cloud requires a different approach to managing cybersecurityOn-prem ERP/SCM/HCMCloud ERP/SCM/HCMFewer users,limited locationsClosed,internal integrationsSlow,pre
4、dictable change cyclesFocus on infrastructure securityWhy traditional cybersecurity fails for Cloud ERPMultiple layers between attacker&sensitive dataLog monitoring alone cannot interpret ERPs sophisticated roles,entitlements,and configurations.Lack of business transaction contextOnly transaction-le
5、vel analysis can reveal misuse,toxic access,and SoD violations.Lack of process owner engagementProcess owners must help determine what is important and impactful for the business.5Copyright 2025,Oracle and/or its affiliates|Confidential:Internal/Restricted/Highly RestrictedLegacy cybersecurity techn
6、iques generate more noise,less signalData-driven security controlsAnalysis and tracking from objective to access to actionGo beyond what users can do to what they actually do in ERPCybersecurity frameworks specifically tailored for Cloud ERPDeliver consistent monitoring and ERP posture assessment.Co