Home / Educational Content / JD Edwards / INFOCUS 22: Auditing “Risky” Changes: How to Identify and Prevent Data Breaches

INFOCUS 22: Auditing “Risky” Changes: How to Identify and Prevent Data Breaches

Presented at INFOCUS 22
Session ID:101680

Rapid digital transformation is occurring at an unprecedented rate that could negatively impact your organization’s most essential assets. From evolving risks, such as the exploitation of payroll data, to business challenges that include limited resources, it’s key for leadership to find ways to detect and prevent risk efficiently. Indeed, data is considered a precious commodity – but how are you protecting your organization’s financial wellbeing? With potentially millions of daily updates taking place within your ERP and database, the key is to monitor and identify these “risky” critical data changes. What’s more, it’s vital to consider implementing preventative controls to mitigate future risk effectively. Whether you are an IT professional, a Business Analyst, a Finance Executive, or somewhere in between, you will benefit from a better understanding of how you can detect and prevent risk within your organization, within and beyond your database.

Objectives:

• Understand the role of consistent monitoring activities across your ERP and database

• Learn to identify high-risk data changes taking place outside your standard processes

• Discover how you can implement preventive controls to protect your data

Watch the full-length video

Premium Content: access is limited to Quest Corporate and Professional members.

Membership has its perks. Get unlimited access to the latest Oracle updates, event session replays, strategic content centers and special members-only programming, plus big discounts on conference registration, with a Quest Corporate or Professional membership. Quest is where you learn.

INFOCUS 22: Auditing “Risky” Changes: How to Identify and Prevent Data Breaches