Tag: PeopleSoft Supplier Relationship Management

PeopleSoft Approval Workflow (Awe) In Action Presented by Frankenmuth Mutual Insurance Company Session ID 105760, presented at COLLABORATE 15 In this session attendess will learn how Frankenmuth Insur

Power to the People: Understanding PeopleSoft Update Manager and the New Lifecycle Management Process Presented by Kerry Quast, Westfield Group, Inc. Kelly Korb, Westfield Group, Inc.

PeopleSoft Customers: Prepare yourselves for the new IFRS/GAAP Revenue Recognition Standards Presented by Chad Tovar, Cardinal Point Solutions Donald Woodford, Cardinal Point Solutions Duration: abo

From Paper to 9.2: Lessons learned by State of ND as we implemented Recruiting Solutions Presented on Wed, Jan 21 by Recruiting SIGIn this hour long session, the State of ND will review how they imple

Performance Tuning Strategies for PeopleSoft Batch Processing Presented by James Bryant, Sr. Application Developer, Duke Energy Duration: about 30 mintues Intended for PeopleSoft Users When you hear

PeopleSoft Townhall Presented by Paco Aubrejuan, SVP, PeopleSoft Enterprise Development, Oracle Corp. Duration: about one hour Intended for PeopleSoft Users Did you miss the PeopleSoft general sessi

Query - Tips, Tricks, and Observations Presented by Mark Kirkland, Manager, PeopleSoft Development Team, Packaging Corporation of America Duration: about one hour Intended for PeopleSoft Users This

How to Protect Your System in a World of Evolving Threats

Presented by Greg Kelly, Product Strategy Manager - PeopleTools, Oracle Corp.

Duration: about one hour

Intended for PeopleSoft Users

Hackers are becoming more resourceful, and more people have apparently valid access to your data, with the prospect of deliberate or inadvertent abuse. How do you develop an approach to provide the highest level of protection possible and to minimize the consequences if and when you do suffer a breach? This session looks at what features are available within Oracle 's PeopleSoft product family to secure data, transactions, devices, and humans. We'll also look at:

-Fundamental Breach Protection Guidelines

-PeopleTools Security and Secure Enterprise Enablement

-Enhancing Security (non Oracle Solutions)

-Guarding Against Phishing Attacks

-Considerations for BYOD (Mobile) Security

-Considerations for Cloud Security

-What about \"The Internet of Things?\"

OBJ 1: Learn about new PeopleSoft security features

OBJ 2: Understand phishing techniques

OBJ 3: Mitigate different threat vectors