Tag: Security

Oracle Database, Enterprise Edition has hundreds of powerful features that help you secure your data, and new capabilities are added with every release. In this session join Oracle product managers to discover 10 security features you may not be aware of. These features can help you streamline user administration, reduce your attack surface, deploy more-secure applications, and protect sensitive data. Spoiler alert: nothing covered in this session requires an extra-cost license.

Join us to learn how to replace error-prone spreadsheet analysis with modern segregation of duties security analysis tools to design ERP roles, certify user’s access to sensitive personal data, and protect data privacy. Continuously monitor for high-risk changes to master data and cloud application configuration setups and uncover new risks using data science techniques. Presented…

Join us for a discussion to learn about cybersecurity threats and the potential impact on your organization and on your JD Edwards system.

Are your auditors breathing down your neck? Do you have new audit requirements this year that you didn’t have in the past? Are there Segregation of Duties problems? Who really has Production access for Critical Processes? Proving your security model is effective and that your change management processes are in place can be incredibly cumbersome. Information needs to be analyzed from different points of view.

With a rapid transition to remote access, organizations are struggling to maintain oversight into critical financial operations. For many, enabling remote access to PeopleSoft FSCM is a new requirement – even for those who had previously allowed remote access to HCM Self-Service. Because visibility is a cornerstone of oversight, organizations must enhance how they monitor…

Apr 24 @  3:30pm

  Oracle Database, Enterprise Edition has hundreds of powerful features that help you secure your data, and new capabilities are added with every release. In this session join Oracle product managers to discover 10 security features you may not be aware of. These features can help you streamline user administration, reduce your attack surface, deploy…

Apr 23 @  11:00am

  Join us for a discussion to learn about cybersecurity threats and the potential impact on your organization and on your JD Edwards system. • How to plan and prevent cybersecurity attacks and address vulnerabilities • The NIST framework and how to use some of the key elements • Focus on types of threats and…

Apr 22 @  3:30pm

Are your auditors breathing down your neck? Do you have new audit requirements this year that you didn't have in the past? Are there Segregation of Duties problems? Who really has Production access for Critical Processes? Proving your security model is effective and that your change management processes are in place can be incredibly cumbersome.…

With recent events related to Coronavirus (COVID-19) requiring remote work, expanded access to critical transactions in PeopleSoft is now a business objective. However, this can pose a clear and present danger to your ERP data. As your attack surface increases with remote access, IT and security leaders must understand the underlying implications and take immediate…

Apr 21 @  12:30pm

How long does it take your organization to realize someone breached your ERP data? Deciphering regular activity from malicious access to proactively detect breaches requires granular visibility into user activity, data access, and usage. Unfortunately, existing native security can only provide limited visibility. In this session, you’ll learn how implementing granular logging and analytics into…