Tag: Security
Learn how to create your own virtual cloud network using Oracle Cloud Infrastructure. In this workshop you will see how to create your own compute instances, configured as web servers, and create a load balancer to manage the HTTP requests. You will also learn about OCI security, how to create and manage network routing rules, various storage options, and more.
-
- Recordings & Presentations
- 5/11/20
Oracle Database, Enterprise Edition has hundreds of powerful features that help you secure your data, and new capabilities are added with every release. In this session join Oracle product managers to discover 10 security features you may not be aware of. These features can help you streamline user administration, reduce your attack surface, deploy more-secure applications, and protect sensitive data. Spoiler alert: nothing covered in this session requires an extra-cost license.
-
- Recordings & Presentations
- 5/06/20
Join us to learn how to replace error-prone spreadsheet analysis with modern segregation of duties security analysis tools to design ERP roles, certify user’s access to sensitive personal data, and protect data privacy. Continuously monitor for high-risk changes to master data and cloud application configuration setups and uncover new risks using data science techniques. Presented…
-
- Recordings & Presentations
- 5/05/20
Join us for a discussion to learn about cybersecurity threats and the potential impact on your organization and on your JD Edwards system.
-
- Recordings & Presentations
- 5/05/20
Are your auditors breathing down your neck? Do you have new audit requirements this year that you didn’t have in the past? Are there Segregation of Duties problems? Who really has Production access for Critical Processes? Proving your security model is effective and that your change management processes are in place can be incredibly cumbersome. Information needs to be analyzed from different points of view.
-
- Recordings & Presentations
- 5/04/20
With a rapid transition to remote access, organizations are struggling to maintain oversight into critical financial operations. For many, enabling remote access to PeopleSoft FSCM is a new requirement – even for those who had previously allowed remote access to HCM Self-Service. Because visibility is a cornerstone of oversight, organizations must enhance how they monitor…
-
- Recordings & Presentations
- 5/01/20
Oracle Database, Enterprise Edition has hundreds of powerful features that help you secure your data, and new capabilities are added with every release. In this session join Oracle product managers to discover 10 security features you may not be aware of. These features can help you streamline user administration, reduce your attack surface, deploy…
-
- Webinars
Join us for a discussion to learn about cybersecurity threats and the potential impact on your organization and on your JD Edwards system. • How to plan and prevent cybersecurity attacks and address vulnerabilities • The NIST framework and how to use some of the key elements • Focus on types of threats and…
-
- Webinars
Are your auditors breathing down your neck? Do you have new audit requirements this year that you didn't have in the past? Are there Segregation of Duties problems? Who really has Production access for Critical Processes? Proving your security model is effective and that your change management processes are in place can be incredibly cumbersome.…
-
- Webinars
With recent events related to Coronavirus (COVID-19) requiring remote work, expanded access to critical transactions in PeopleSoft is now a business objective. However, this can pose a clear and present danger to your ERP data. As your attack surface increases with remote access, IT and security leaders must understand the underlying implications and take immediate…
-
- Recordings & Presentations
- 4/22/20