Tag: Multi-Layered Security Planning

Caroline Wong, Chief Security Strategist at Cobalt.io, a cybersecurity company, wrote an article in Forbes about 10 cybersecurity blind spots that companies should keep an eye on. These are issues that security teams don’t always see or aren’t always accounting for, but they should be.

101470 Presented at RECONNECT 19

With more enterprises hosting mission-critical applications like Oracle-PeopleSoft in the cloud, application managers and DevOps teams need to be aware of the evolving threat landscape. They also need to architect the deployment to be resilient in the face of ever-evolving threats. In this talk, Laurent Gil will share the latest cybersecurity research findings based on real-world security operations along with innovative approaches to managing and mitigating security events at the cloud edge. He'll also talk about how one global energy and waste management firm strengthened its security posture and protected its cloud-based PeopleSoft implementation from DDoS attacks with the Oracle Web Application Firewall (WAF). You'll learn about the steps companies take—and the security challenges they overcome—when moving PeopleSoft to Oracle Cloud Infrastructure.

Presented by Laurent Gil, Oracle Corp.

Barb Darrow, Senior Director of Communications at Oracle, wrote about today’s “unprecedented challenge” of cybersecurity. Technological and legal complexities are continuing to grow in this age of heightened cybersecurity threats—including a rise in state-sponsored hacking. This “unprecedented challenge” was a topic of conversation between Dorian Daley, Oracle Executive Vice President and General Counsel, and Edward Screven, Oracle’s Chief Corporate Architect during Oracle’s recent Media Days.

Dorian Daley, Executive Vice President and General Counsel at Oracle, and Edward Screven, Chief Corporate Architect at Oracle, spoke about the current threat landscape and Oracle’s strategy for addressing it. The pair spoke about how Oracle is enhancing the relationships with customers by adopting a service model that allows customers to shift the security burden and risk to Oracle. They also covered how Oracle has rebuilt Cloud and the Autonomous Database, so customers are fully equipped to truly protect their data and eliminate human error from the security equation.

Every CFO knows the opportunity to commit fraud is prevalent in an ERP system. Implementing controls such as Segregation of Duties is a critical tool in discouraging and preventing fraudulent activities. Designing appropriate roles and reporting tools allow the CFO to establish and maintain a reliable control environment. Levi Gibson, Pinal County Government Session: 107800,…

110320 Presented at COLLABORATE 19 Join us for this session to learn how to make your JDE security refreshed, relevant and compliant! JDE SECURITY BEST PRACTICES: Discover how to overcome challenges, use best practices, and what design decisions might cause issues if you don’t approach your security with care! Learn about traditional JDE security, UDO,…

109680 Presented at COLLABORATE 19 Oracle Cloud HCM Security - From Moonless Night to Moonlit Night" is geared towards an audience interested in Human Capital Management (HCM) Security. I will review our journey starting with our Implementation and then transitioning to the maintenance of security. I will also discuss the improvements in Oracle Cloud Security…

Presented at COLLABORATE 19 Session ID: 106030 In 9.2, Oracle made a significant change in JDE security by introducing Data Source Security. Prior to 9.2, the CNC simply created a system user to match an identical user on the database. If you wanted to have more control over direct database access you had to implement Oracle…

Using EnterpriseOne has never been easier than now with the new tools available with User Defined Web Objects (UDOs) and even UX1.  UDOs are web objects that streamline your interface with E1 information and applications.  What do you need to know in working with them?  How do you go about granting permissions quickly and easily to put these tools in the hands of the right users?  Let us walk you through options of what you will need to know to implement them successfully.

109010 Presented at COLLABORATE 19 JD Edwards environments can be exposed to risk by using outdated security standards and configurations regarding SSL 3.0/TLS 1.0/TLS1.1. This leaves passwords without encryption which open the door for malicious software to steal a password. Learn how to enable highly secure protocols and disable legacy protocols for both PY and…

Securing who can do what in JDE is a critical component of a compliance initiative, but it is not the only security you need to be looking at.  Many enterprises have multiple operating companies and business units and for various reasons, need to keep the data for one company separated from the other companies.  How…

Presented at COLLABORATE 19 Session ID: 105400 At Adventist Health System we have implemented Single Sign-On(SSO) for PeopleSoft Interaction HUB and other SAML enabled ancillary applications using SecureAuth Idp. This presentation includes step by step deployment process, need for SSO solution, required customizations in PeopleSoft for better user experience and seamless authentication with other third-party SAML…

105050 Presented at COLLABORATE 19 Enterprise systems provide a single system of record with endless business capabilities, but exposing the whole monolithic system through a single interface to all users comes with substantial security risks. When designing for security, system architects should begin by identifying different user groups that will interact with the system, separating…

104970 Presented at COLLABORATE 19 Page Field configuration framework introduced in PeopleTools 8.55 is a significant tool aimed at reducing customization i.e. 'code changes', by achieving the same requirements via online configurations. In addition to this  objective reducing customization, this framework opens up a wide range of new possibilities for PeopleSoft customers. In this session…

104900 Presented at COLLABORATE 19 CTB Inc., a leading global designer, manufacturer and marketer of agricultural systems and solutions is now prepared for the dreaded IT Audit on JD Edwards Security. IT security audits have always been painful, at best. We ask ourselves which SoD will be the target this time? Did we miss a…

Want to meet people in the security and compliance field?  Join our Security Speed Networking event!  It will allow you to meet other professionals in your field, ask questions, share ideas, brainstorm and benefit with new community contacts.  Get the opportunity to meet a wide variety of experts in a one on one fast paced…