Tag: Security
This session was presented at Oracle Fusion Cloud Days 2024.
-
- Recordings & Presentations
- 11/26/24
A post-Covid business environment forced the expansion of PeopleSoft access, which has “opened a can of worms” on multiple fronts. Specifically - securing identity, application access, and the sensitive business data residing in your PeopleSoft systems. All of these areas must be secured effectively, efficiently, and without resulting in a loss of productivity. Sounds easy,…
-
- Recordings & Presentations
- 12/07/22
Audit time can be a rush, searching for scripts, checking what happened last year. And the C level need re-assurance, particularly as you move to the Cloud. Can you cope with providing these answers, giving realistic assurances? This presentation will look at these questions, topics will include: Assessing (& Understanding) your Current ERP Security Tracking Segregation of Duties Risk Evaluation – how does it work Audit Reporting – what are the “standards” Automating Controls (eg User Provisioning) Working across Multiple Systems (eg JDE, Ariba, Salesforce etc) Satisfying the Business by providing Efficiency & Control Planning Remediation
-
- Recordings & Presentations
- 12/06/22
Database & Technology Week dives deep into current Database & Technology challenges, strategies for best practice, and real-life applications covering hot topics like Autonomous Database, Security, OCI Database Management, Infrastructure Technology, Unified Observability, Oracle APEX Application Development 22.2, and Machine Learning
- Event Hubs
- Database & Technology
Presented at BLUEPRINT 4D 2022
Title: The Intersection of Innovation, Security and Support for JD Edwards
Session ID: 108180
Release 22 is your Digital ERP release, delivering innovation that automates, optimizes, and transforms business processes but it is also your release for protection against security threats. While digital transformation helps create a competitive advantage, Release 22 is equally important as it contains the most current security patches for JD Edwards and certified platforms. Attend this session to learn about the latest JD Edwards innovation that will power your digital transformation while providing you protection against the latest security threats.
-
- Recordings & Presentations
- 8/11/22
Presented at BLUEPRINT 4D 2022
Title: JDE Security 101 – The Ultimate Guide to the E1 Galaxy & Beyond
Session ID: 103150
Are you new to JDE E1 Security? Perhaps an auditor or analyst wanting a better understanding of JDE security? Or maybe you’re a seasoned JDE professional and just want a refresher course? Understanding JDE E1 security is a journey through a vast galaxy with many unknowns along the way. That’s why it’s important to be clear on the basic concepts that underpin the rules of the security galaxy! Join us for this session on JDE Security Fundamentals where we will provide you a foundation of JDE system and outline the individual elements that make-up security.?We will focus on the steps involved in planning, implementing, and maintaining JDE security from start to finish. Join the us for a journey through the E1 galaxy & beyond.
-
- Recordings & Presentations
- 8/10/22
Presented at BLUEPRINT 4D 2022
Title: How To Protect Your JD Edwards System from Cyberattacks
Session ID: 111010
During this session learn how to protect your JD Edwards system from cyberattacks.
-
- Recordings & Presentations
- 8/10/22
The Critical Patch Update for April 2022 was released on April 19, 2022. Oracle strongly recommends applying the patches as soon as possible. If you are new to this process, please review Oracle's Security Fixing Policies and the Critical Patch Update Advisory. After reviewing these resources, if you are unable to determine if you require a software update, or how to apply it, please contact Oracle Support.
-
- Blogs
- 4/25/22
Today’s business environment presents a myriad of challenges for organizations looking to secure identity, protect sensitive data, and reduce risk from fraud. Between a combination of dynamic (remote) access requirements and complex business processes, it is clear that modern security strategies must simultaneously focus on the application, transaction, and data levels in order to be effective. But in a landscape of disparate solutions, detective controls, and static governance – how can you evolve and modernize your security strategy? What should you truly be focused on?
Join Greg Wendt, Oracle security expert and Executive Director of Security Solutions at Appsian as he breaks down today’s most pressing security challenges and provides best practices for organizations looking to ramp up their multi-layer security strategy – quickly and most effectively.
In this session, you will learn:
•How to achieve a common control framework of data security & data privacy (for EBS and cross-application)
•How to identify and mitigate the most common responsibility conflicts that lead to SoD violations
•How to implement and enforce strong controls for data loss prevention in order to prevent overexposure and exfiltration
•How to implement security controls that help comply with IT security audits, SOX, GDPR, and other mandates
Speaker: Greg Wendt, Executive Director Security Solutions, Appsian Security
-
- Recordings & Presentations
- 3/11/22
Are your JD Edwards user and security administration costs/turnaround times spiraling out of control?
Have you experienced audit findings around logical access controls that you need to address quickly, but can’t figure out where to start with remediation?
Do you find it difficult to understand your Segregation of Duties ruleset, and how it relates to managing risk in your business? Is it producing a lot of SoD violations that you just can’t make sense of?
If the answer to any of these questions is “yes”, a security assessment is a great starting point to pinpointing and resolving the specific problems in your security model and/or SoD set-up quickly and cost-effectively – and we can help!
In under two weeks, we will analyze your security and SoD, deliver valuable, meaningful insights into problem areas, and recommend priorities for remediation, directly tied to ITGC audit activities.
The initial analysis is automated, then our JD Edwards security and audit experts classify and categorize the results, to help you zone in on your specific problems. The evidence package provides detailed reports that are directly related to a comprehensive remediation plan.
Join us at this session to find out if a security assessment could help you achieve efficiency and compliance at an affordable cost.
Mike Ward & Preston Leftwich, Appsian Security
-
- Recordings & Presentations
- 3/03/22