Tag: PeopleSoft Enterprise

How to Keep your CFO Happy - The Chart of Accounts Lifecycle Presented by Edward Kimtis, Director Chart of Accounts Consulting - SNP GL Associates   Duration: about 45 minutes Intended for all u

Case Study - Converting Reports Into BI Publisher Presented by Sue Lhymn, Senior HRIS Analyst, Erie Insurance Group Duration: about one hour Intended for PeopleSoft Users Converting reports into BI

Seamless User Access, On-Premises or with the Cloud Presented by Greg Kelly, Product Strategy Manager - People Tools, Oracle Corp. Duration: approximately 50 minutes Intended for PeopleSoft Users

PeopleSoft Townhall Presented by Paco Aubrejuan, SVP, PeopleSoft Enterprise Development, Oracle Corp. Duration: about one hour Intended for PeopleSoft Users Did you miss the PeopleSoft general sessi

Learn what the exciting new PeopleSoft Asset Management, Real Estate Management, and Maintenance Management 9.2 capabilities can do for your organization and learn about the PeopleSoft plans to address the FASB and IASB's proposed changes to the lease accounting standards. This session will help you identify the key productivity-enhancing features in PeopleSoft Asset Management, Real Estate Management, and Maintenance Management 9.2 and beyond that you should plan to leverage, give you insight into what to think about for handling leases in the future, and provide you insight into how to prepare for the impact to applications and business practices.

PeopleSoft Administration and Application Management Across the Enterprise Presented by Greg Kelly, Product Strategy Manager - PeopleTools, Oracle Corp. Duration: about one hour Intended for PeoplSo

Query - Tips, Tricks, and Observations Presented by Mark Kirkland, Manager, PeopleSoft Development Team, Packaging Corporation of America Duration: about one hour Intended for PeopleSoft Users This

How to Protect Your System in a World of Evolving Threats

Presented by Greg Kelly, Product Strategy Manager - PeopleTools, Oracle Corp.

Duration: about one hour

Intended for PeopleSoft Users

Hackers are becoming more resourceful, and more people have apparently valid access to your data, with the prospect of deliberate or inadvertent abuse. How do you develop an approach to provide the highest level of protection possible and to minimize the consequences if and when you do suffer a breach? This session looks at what features are available within Oracle 's PeopleSoft product family to secure data, transactions, devices, and humans. We'll also look at:

-Fundamental Breach Protection Guidelines

-PeopleTools Security and Secure Enterprise Enablement

-Enhancing Security (non Oracle Solutions)

-Guarding Against Phishing Attacks

-Considerations for BYOD (Mobile) Security

-Considerations for Cloud Security

-What about \"The Internet of Things?\"

OBJ 1: Learn about new PeopleSoft security features

OBJ 2: Understand phishing techniques

OBJ 3: Mitigate different threat vectors

Does the PeopleSoft Query tool intimidate you? Do you rely on others to write and/or maintain the queries you use? Maybe you are a frequent user and design your own queries, but have not used some of