Quest Forum Digital Event 2020
Standard User roles, custom roles, data segment security, business unit security, ledger data access sets, asset book are all part of the puzzle to properly designing your Cloud user security matrix. Join us as we take a journey through all the security puzzle pieces to reach a well defined user security structure.
Learning Objective 1: Gain an understanding of what features are available in designing your user security.
Learning Objective 2: Identify the advantages and disadvantages of each security option along with the maintenance level that each encompasses.
Learning Objective 3: Listen to the lessons learned from an actual Cloud user security design
Presented by Debbie Adams & Carrie Thacker, The Hackett Group