SlideShare ist ein Scribd-Unternehmen logo
1 von 47
Security and
Segregation of Duties
for PeopleSoft
Session #29904
March 29, 2011
Denise Goin, PeopleSoft Security Specialist
University of Nebraska CSN
  14+ years working with PeopleSoft Security,
  Campus Solutions, HR, Financials, Portal.
  Higher Ed, Public and Private Sector. Former
  Oracle Security Consultant.
Kirk Chan/Ramesh Panchagnula, Smart ERP
Solutions, Inc.
Multi-Institutional Implementation in 2 Production
Instances
Using SmartSecurity in Development as well as
in Production environments




Overview of solution providing automated
Segregation of Duties directly from within your
PeopleSoft
Row Level Security at the
 University of Nebraska
                Denise Goin
 PeopleSoft Security Specialist, University of
               Nebraska CSN
Nebraska Student Information System structure
Change in how Security is structured, maintained
  Business Process changing- enable SACR security to the
  functional offices
  Shared data/components/SACR (Especially with Multi-Institution)
Why Nebraska choose Smart Security?
  No row level security on many components in the system, and no
  read all/update own on anything.
  Fully configurable as business processes change, or new
  functionality is needed.
    As wide open or as restricted as we like.

Business Requirement- To be able to SEE everything, but only
allow UPDATE to our own students, especially CPP
Nebraska Student
            Information System
                        NeSIS

            NU                          NSCS

UNL   UNO        UNK   UNMC   Chadron   Wayne   Peru
NeSIS Security Team
                              PeopleSoft
                           Security Specialist



         University Security                      State College
              Analyst                            Security Analyst


UNK      UNL     UNMC      UNO            CSC           PSC         WSC
Sec.    Sec.      Sec.     Sec.           Sec.         Sec.         Sec.
Cord.   Cord.    Cord.     Cord.          Cord.        Cord.        Cord.
Row Level Security- The Issues
 Business Processes Changing
   SF SACR Security started the trend
 No Institution Specific row level security on
 many pages
   Transactional
   Configuration
   Security/SACR Security
 Using the Security views on the pages that
 allow it, didn’t allow for viewing other schools
 data when needed.
   Transactional
   Configuration
   Security/SACR Security
   Custom/Cloned
But……..We Want it ALL

 How to grant access to Students Data from
 another school without running the risk of
 mistakes being made when entering data?
   Many students will attend multiple Universities,
   even in the same term.
 Can we protect the data and still allow access
 to it?
Transactional Pages
Campus Community > Personal Information (Student) > Identification (Student) > Citizenship > Citizenship and Passport
Campus Community > Personal Information (Student) > Identification (Student) > Citizenship > Visa Permit Data
Campus Community > Personal Information (Student) > Identification (Student) > Residency Data
Campus Community > Personal Information > Identification > Residency Data
Campus Community > Personal Information Student > Participation Data Student > Athletic Participation 
Curriculm Management > Combined Sections > Combined Sections Table
Curriculum Management > Combined Sections > Identify Combined Sections
Curriculm Management > Enrollment Requirements > Define Requisite Student Groups
Curriculm Management > Enrollment Requirements > Enrollment Course Lists
Curriculm Management > Enrollment Requirements > Enrollment Requirement Groups
Curriculum Management > Class Rosters > Class Rosters
Curriculum Management > Dynamic Dates > Dynamic Class Dates Table
Curriculum Management > Enrollment Requirements > Define Requisite Entity Groups
Curriculum Management > Enrollment Requirements > Define Test for Requisites
Curriculum Management > Grading > Grade Roster
Records and Enrollment >  3 C's Summaries  >  Communication Summary 
Records and Enrollment >  3 C's Summaries  > Personal Checklist Summary
Records and Enrollment > Career and Program Information > Student Program Plan
Records and Enrollment > Enrollment Summaries> Enrollment Summary
Records and Enrollment > Graduation > Honors and Awards
Records and Enrollment > Graduation > Student Degrees
Records and Enrollment > Student Term Information > Student Grades
Records and Enrollment > Student Term Information > Term Activtate A student
Records and Enrollment > Student Term Information > Term History
Records and Enrollment > Term Processing > Appointment Table
Records and Enrollment > Term Processing > Student Appointment Block
Records and Enrollment > Term Processing > Student Enrollment Appointment
Records and Enrollment > Transfer Credit Evaluation > External Education
Records and Enrollment > Transfer Credit Evaluation > Test Results
Student Admissions > External Test Score Processing >Test Results
Student Admissions > Application Entry > Academic Information > Test Results
Configuration/Setup Pages
Curriculum Management > Instructor/Advisor Information > Instructor/Advisor Table
Records and Enrollment > Term Processing > End of Term Processing > Repeat Rule
Records and Enrollment > Term Processing > End of Term Processing > Repeat Scheme Table
Set Up SACR > Common Definitions >  Student Group Table
Set Up SACR > Common Definitions > Service Indicators > Service Impact Table
Set Up SACR > Common Definitions > Service Indicators > Service Indicator Table
Set Up SACR > Product Related > Student Records > Curriculum Management > Dynamic Class Dates
Set Up SACR > Product Related > Student Records > Curriculum Management > Instruction Mode
Set Up SACR > Product Related > Student Records > Enrollment > Enrollment Action Reason
Set Up SACR > Product Related > Student Records > Enrollment > Time Period Table
Set Up SACR > Product Related > Student Records > Enrollment > Unit Conversion Table
Set Up SACR > Product Related > Student Records > Grading > Cum. Grade Point Average
Set Up SACR > Product Related > Student Records > Grading > Grade Category
Set Up SACR > Product Related > Student Records > Student Standing and Awards > Academic Standing Rule
Set Up SACR > Product Related > Student Records > Student Standing and Awards > Academic Standing Table
Set Up SACR > Product Related > Student Records > Student Standing and Awards > Degree Honors Table
Set Up SACR > Product Related > Student Records > Transcript > Define Transcript Type
Set Up SACR > Product Related > Student Records > Transcript > Transcript Notes Table
Set Up SACR > Product Related > Student Records > Transcript > Transcript Type
Set Up SACR> Foundation Tables > Academic Structure > Academic Career Table
Set Up SACR> Foundation Tables > Academic Structure > Academic Group Table
Set Up SACR> Foundation Tables > Academic Structure > Academic Insitution Table
Set Up SACR> Foundation Tables > Academic Structure > Academic Plan Table
Set Up SACR> Foundation Tables > Academic Structure > Academic Program Table
Set Up SACR> Foundation Tables > Academic Structure > Academic Subject Table
Set Up SACR> Foundation Tables > Academic Structure > Academic SubPlan Table
Set Up SACR> Foundation Tables > Academic Structure > Campus Table
Set Up SACR> Foundation Tables > Academic Structure > Grading Scheme Table
Set Up SACR> Foundation Tables > Academic Structure > Level/Load Rules Table
Set Up SACR> Foundation Tables > Facilities > Facility Table
Set Up SACR> Foundation Tables > Term Setup > Academic Calendar
Set Up SACR> Foundation Tables > Term Setup > Term/Session Table
Security Pages


Set Up SACR > Security > Secure Student Administration > Setup > Enrollment Group Access
Set Up SACR > Security > Secure Student Administration > Setup > Enrollment Security Table
Set Up SACR > Security > Secure Student Administration > Setup > Service Indicator Display
Set Up SACR > Security > Secure Student Administration > Setup > User Security Replacement
Set Up SACR > Security > Secure Student Administration > UserID > Institution


PeopleTools > Security > Permission Lists and Roles > Permission  Lists
PeopleTools > Security > Permission Lists and Roles > Roles
Read All/Update own
Read All/Update own
Define CPP Read All/Update Own
Define Security Access by Role
 Name- View All Update Own
Define Security Access by Role
 Name – Only See/Update own
Define Security Access by Role
 Name – Only See/Update own
SACR Configuration Pages- Update
 Own/View All vs Only See/Update
            My Own
SACR Configuration Pages- Update
          Own/View All
Very Configurable
Effective Segregation of
          Duties
             Kirk Chan
     VP, Business Development

       Ramesh Panchagnula
           President


    Smart ERP Solutions, Inc.
“Effective” Segregation of Duties (SoD)
Smart SoD™: Effective SoD for PeopleSoft
Demo
Summary and Q & A
A key element in the compliance lifecycle




 10+ years, ERP
 compliance solutions




 Smart Security for
 PeopleSoft
Proactive
                SoD




             SoD
                         Reactive
Mitigation
                           SoD
Built-in model enables SoD enforcement
Violations checked BEFORE go-live
Your decision to enforce rules or allow violations
Saves time (= money)
Easy set-up and testing for violations
Quick and easy reporting
Reduces number of compensating controls required
Reduces auditing effort / costs
Reduces risk
Enforcing and reporting SoD violations reduces opportunity
for fraud
Nothing in PeopleSoft
Any release
Use a Spreadsheet?
How do you…
Ensure the actual access control mirrors the
spreadsheet?
Right people access the right data?
Manage change control problems?
Assess impact of changes?
Manage enforcement of SoD?
Aim:
Prevent SoD Violations occurring during security Assignment.
        Ensure Security Policy is enforced long term.
A/P “Super”
                                             SoD
 Voucher Clerk Role                                                    OK
1.   AP Voucher clerk
                                          Violations
2.   Secondary role 2                       Check
3.   Secondary role 3
                    6

                                                  Violations
                          Segregate this task:   From this task
                                                                            Build Security
       Change
   Role assignment        Sales Order Entry      Purchase Order

          Or              Vendor Master          Bank Payments

       Security           Sales Pricing          Sales Order Entry
        without           Purchase Order         Goods Receipt
affecting live security   Customer Master        Sales Order Entry

                          Sales Order Entry      Credit limits

                          Credit Notes           Invoicing (A/R)

                          Purchase Order         Vendor Master

                          Purchase Order         Invoice entry (A/P)    Extract from pre-populated,
                          Vendor Master          Purchase Order         model
                          Vendor Master          Credit Notes

                          Invoice entry (A/P)    Bank Payments
Aim:
Accurately assess existing security for
             remediation.
     Reduce Audit time and cost.
 Build case for restructuring security.
Roles
                            (High-
                            Level)



               Permission
                   List
                (Process)


                                   Components
                                 (In-depth Audit)



Reporting directly on
 existing PeopleSoft
        security
Creating a journal entry and opening a closed accounting period
Maintaining accounts receivable master data and posting receipts
Depositing cash and reconciling bank statements
Completing goods transfer and adjusting physical inventory counts
Approving time cards and distributing paychecks
Preparing an order and changing a billing document
Changing an order and creating a delivery
Creating a journal entry and opening a closed accounting period
Creating general ledger accounts and posting journal entries
Maintaining bank account information and posting payments
Role level
Create matrix of all active system roles
Identify all roles that should not be linked to the same user
Such as purchasing and payments
Permission List / Business Process level
Include Application security & processing options
Add to / modify as needed
Component / Program level
Add in any custom or modified processing
If creating your own rules, start with most important controls &
gradually add to them
Current Economic Climate (fewer employees)
Many redundancies equates to less people doing more.
Major requirement from Audit to allow remediation where a
user is considered a risk.
SOX requires that during an audit all risks must at least be
visible and understood by the business.
With this comes risk assessment and documentation.
Seasonal Changes
Staff holidays or time away from office requires other
users be able to perform these additional duties.
Ability to mitigate users once a validation has occurred.
Details of mitigation, including notes get added to a
mitigation table.
The user gets checked during the next validation but is
not added to the violations table.
Ability to time out mitigations, i.e. allowing for staff who
are on holiday, etc.
Business Requirements                                                           Smart Solutions
Row level security on any data that requires limited or authorized access
                                                                                Smart Security
Define , manage and enforce segregation of duties for various roles within
an organization to adhere to compliance requirements
                                                                                Smart SoD
Robust workflow approval capabilities across any business transaction or
documents across your Enterprise
                                                                                Smart Workflow

Streamlined and easy-to-use data entry pages configured to meet your
specific business process requirements, incl. industry reqmts; Easily add
                                                                                Smart Docs including
features anywhere such as Save as Draft, Copy from Templates,                   ERP Gadget
Attachments, Configurable Print, Collaborative Comments, Workflow, User
Help, Business Process View
Configuring and tailoring business processes to meet your organization’s
specific processes, including defining step-by-step actions for each
                                                                                Smart Enterprise BPM
process and managing your users through your organizations specific
business process.
One-stop visibility into the full business process lifecycle of a transaction
                                                                                Smart Lifecycle Viewer
Addressing additional compliance requirements not in standard
PeopleSoft: I-9/W-4 Form, 1042 Foreign National Requirements
                                                                                Smart Compliance
Manageable solutions for complex integration needs
                                                                                Smart Integration Packs
Other Common, Critical and Complementary business requirements
                                                                                Tell us, we’ll build it!
Developed expressly for PeopleSoft
    Q
                      by SmartERP in cooperation with Q
Software              Software
                      Uniquely integrated within your
           SmartERP
                      current PeopleSoft
                      Powerful Proactive, Reactive and
                      Mitigation features
                      Built-in
 Smart SoD™           Analytics/Reporting/Dashboards
                      Use delivered SoD rules or easily
                      create your own
SoD Model and Rules
Reactive: Mass check for user violations
Proactive: Validate new user profile
against established SoD rules
Dashboard/Analytics
Value Statement
Segregation of Duties is an important element of your overall
PeopleSoft security and risk management

   Key Features of Smart SoD can help you maintain legislative
    compliance (SoX), meet audit requirements and reduce the
    likelihood and impacts of fraud and errors
     Expressly designed for your current PeopleSoft
     Powerful Proactive, Reactive and Mitigation Features
     Automated Workflow Approvals
     Reporting/Dashboards facilitate audits and compliance
     Use pre-packaged built-in SoD rules (from PeopleSoft audits) or easily
     create your own
     Add-on Architecture Lowers Total Cost of Ownership
     Seamless Integration
     Utilize Best Practices
     Maintenance and Upgrades
Denise Goin
   PeopleSoft Security Specialist
   University of Nebraska CSN
   University of Nebraska
   E-mail: ddgoin@nebraska.edu


Kirk Chan
   VP, Business Development
   Smart ERP Solutions, Inc.
   E-mail: kirk.c@smarterp.com

Ramesh Panchagnula
   President
   Smart ERP Solutions, Inc.
   E-mail: ramesh.p@smarterp.com
This presentation and all
Alliance 2011 presentations
are available for download
from the Conference site at
      www. heug.org
   www.psugonline.org
www.federalusersnetwork.com
Presentations from previous meetings are also available

Weitere ähnliche Inhalte

Was ist angesagt?

Known Error Database (KEDB)
Known Error Database (KEDB)Known Error Database (KEDB)
Known Error Database (KEDB)
Vimal Patel
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
Wajahat Rajab
 

Was ist angesagt? (20)

Known Error Database (KEDB)
Known Error Database (KEDB)Known Error Database (KEDB)
Known Error Database (KEDB)
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part V)_ver1-0SABSA Implementation(Part V)_ver1-0
SABSA Implementation(Part V)_ver1-0
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
Technology Alignment Framework
Technology Alignment FrameworkTechnology Alignment Framework
Technology Alignment Framework
 
ITSM Foundation Course Material
ITSM Foundation Course MaterialITSM Foundation Course Material
ITSM Foundation Course Material
 
Tech Talk: Privileged Account Management Maturity Model
Tech Talk: Privileged Account Management Maturity ModelTech Talk: Privileged Account Management Maturity Model
Tech Talk: Privileged Account Management Maturity Model
 
Business continuity-plan-template
Business continuity-plan-templateBusiness continuity-plan-template
Business continuity-plan-template
 
Ppt Site Security Management
Ppt  Site Security ManagementPpt  Site Security Management
Ppt Site Security Management
 
SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0SABSA Implementation(Part VI)_ver1-0
SABSA Implementation(Part VI)_ver1-0
 
GDPR Assessment Checklist.pptx
GDPR Assessment Checklist.pptxGDPR Assessment Checklist.pptx
GDPR Assessment Checklist.pptx
 
Bcp
BcpBcp
Bcp
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
IBM Security Software Solutions - Powerpoint
 IBM Security Software Solutions - Powerpoint IBM Security Software Solutions - Powerpoint
IBM Security Software Solutions - Powerpoint
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPR
 
SIEM & IAM
SIEM & IAMSIEM & IAM
SIEM & IAM
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Segregation of Duties and Continuous Delivery
Segregation of Duties and Continuous DeliverySegregation of Duties and Continuous Delivery
Segregation of Duties and Continuous Delivery
 

Andere mochten auch

Hans Henseler - Intelligent data analysis for improving public security - Da...
Hans Henseler - Intelligent data analysis for improving public security -  Da...Hans Henseler - Intelligent data analysis for improving public security -  Da...
Hans Henseler - Intelligent data analysis for improving public security - Da...
DataValueTalk
 
Po report 5 - Role Conflict
Po report 5 - Role ConflictPo report 5 - Role Conflict
Po report 5 - Role Conflict
Syaff Hk
 

Andere mochten auch (19)

Automating PeopleSoft Segregation of Duties: HCM and Financials
Automating PeopleSoft Segregation of Duties: HCM and FinancialsAutomating PeopleSoft Segregation of Duties: HCM and Financials
Automating PeopleSoft Segregation of Duties: HCM and Financials
 
Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23Effective Segregation of Duties for PeopleSoft 2011-02-23
Effective Segregation of Duties for PeopleSoft 2011-02-23
 
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...Profiling for SAP - Compliance Management, Access Control and Segregation of ...
Profiling for SAP - Compliance Management, Access Control and Segregation of ...
 
Government and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP SystemsGovernment and SOX Compliance for ERP Systems
Government and SOX Compliance for ERP Systems
 
Effective Framework for Continuous Auditing
Effective Framework for Continuous AuditingEffective Framework for Continuous Auditing
Effective Framework for Continuous Auditing
 
Fraud in the Non Profit Industry
Fraud in the Non Profit IndustryFraud in the Non Profit Industry
Fraud in the Non Profit Industry
 
Thieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized OrganizationsThieves Within: Preventing Fraud in Small & Medium-Sized Organizations
Thieves Within: Preventing Fraud in Small & Medium-Sized Organizations
 
L’ong tunisian institutional reform vient de publier un rapport s’étendant su...
L’ong tunisian institutional reform vient de publier un rapport s’étendant su...L’ong tunisian institutional reform vient de publier un rapport s’étendant su...
L’ong tunisian institutional reform vient de publier un rapport s’étendant su...
 
Homeland Security Services In Pune
Homeland Security Services In Pune Homeland Security Services In Pune
Homeland Security Services In Pune
 
WEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAPWEBINAR - A New Era in HR Security for SAP
WEBINAR - A New Era in HR Security for SAP
 
HR Outsourced Services
HR Outsourced Services HR Outsourced Services
HR Outsourced Services
 
Hans Henseler - Intelligent data analysis for improving public security - Da...
Hans Henseler - Intelligent data analysis for improving public security -  Da...Hans Henseler - Intelligent data analysis for improving public security -  Da...
Hans Henseler - Intelligent data analysis for improving public security - Da...
 
Smarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoftSmarter Application and Data Security in PeopleSoft
Smarter Application and Data Security in PeopleSoft
 
Po report 5 - Role Conflict
Po report 5 - Role ConflictPo report 5 - Role Conflict
Po report 5 - Role Conflict
 
People soft profile management 9 1
People soft profile management 9 1People soft profile management 9 1
People soft profile management 9 1
 
Security in HR... How secure are your files, really?
Security in HR... How secure are your files, really?Security in HR... How secure are your files, really?
Security in HR... How secure are your files, really?
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
SOD Segregation Of Duties - Séparation de Droits et Responsabilités
SOD Segregation Of Duties - Séparation de Droits et ResponsabilitésSOD Segregation Of Duties - Séparation de Droits et Responsabilités
SOD Segregation Of Duties - Séparation de Droits et Responsabilités
 
Linux – routing and firewall for beginners v 1.0
Linux – routing and firewall for beginners v 1.0Linux – routing and firewall for beginners v 1.0
Linux – routing and firewall for beginners v 1.0
 

Ähnlich wie Security & Segregation of Duties for PeopleSoft

BISS - 11nov2011
BISS - 11nov2011BISS - 11nov2011
BISS - 11nov2011
Agora Group
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Open group spc rosenthal v3
Open group   spc rosenthal v3Open group   spc rosenthal v3
Open group spc rosenthal v3
City of Toronto
 
Fendley how secure is your e learning
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learning
Bryan Fendley
 
26012 Managing & Auditing Security During Implementation And Beyond 03172009
26012 Managing & Auditing Security During Implementation And Beyond 0317200926012 Managing & Auditing Security During Implementation And Beyond 03172009
26012 Managing & Auditing Security During Implementation And Beyond 03172009
denigoin
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
Patty Buckley
 
Alienvault how to build a security operations center (on a budget) (2017, a...
Alienvault   how to build a security operations center (on a budget) (2017, a...Alienvault   how to build a security operations center (on a budget) (2017, a...
Alienvault how to build a security operations center (on a budget) (2017, a...
Asep Syihabuddin
 

Ähnlich wie Security & Segregation of Duties for PeopleSoft (20)

Information security[277]
Information security[277]Information security[277]
Information security[277]
 
Cybersecurity Careers - Step Up Skill Feb2023 (1).pdf
Cybersecurity Careers - Step Up Skill Feb2023 (1).pdfCybersecurity Careers - Step Up Skill Feb2023 (1).pdf
Cybersecurity Careers - Step Up Skill Feb2023 (1).pdf
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwg
 
Information Security - I.T Project Management
Information Security - I.T Project ManagementInformation Security - I.T Project Management
Information Security - I.T Project Management
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security Framework
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
BISS - 11nov2011
BISS - 11nov2011BISS - 11nov2011
BISS - 11nov2011
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Open group spc rosenthal v3
Open group   spc rosenthal v3Open group   spc rosenthal v3
Open group spc rosenthal v3
 
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
Usability vs. Security: How USP Secure Entry Server® (SES) Gives You Both – b...
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles Contrast & Compare & Contrast Information Security Roles
Contrast & Compare & Contrast Information Security Roles
 
Fendley how secure is your e learning
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learning
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
26012 Managing & Auditing Security During Implementation And Beyond 03172009
26012 Managing & Auditing Security During Implementation And Beyond 0317200926012 Managing & Auditing Security During Implementation And Beyond 03172009
26012 Managing & Auditing Security During Implementation And Beyond 03172009
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Alienvault how to build a security operations center (on a budget) (2017, a...
Alienvault   how to build a security operations center (on a budget) (2017, a...Alienvault   how to build a security operations center (on a budget) (2017, a...
Alienvault how to build a security operations center (on a budget) (2017, a...
 
Implementing Security Cs Ps
Implementing Security Cs PsImplementing Security Cs Ps
Implementing Security Cs Ps
 

Mehr von Smart ERP Solutions, Inc.

Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2
Smart ERP Solutions, Inc.
 

Mehr von Smart ERP Solutions, Inc. (20)

Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2Navigating HCM Compliance Through Managed Services Part 2
Navigating HCM Compliance Through Managed Services Part 2
 
Transforming Financial Insights with Oracle EPM
Transforming Financial Insights with Oracle EPMTransforming Financial Insights with Oracle EPM
Transforming Financial Insights with Oracle EPM
 
Maximize your Oracle Cloud Investment and Drive Innovation
 Maximize your Oracle Cloud Investment and Drive Innovation Maximize your Oracle Cloud Investment and Drive Innovation
Maximize your Oracle Cloud Investment and Drive Innovation
 
SmartERP PeopleSoft Security
SmartERP PeopleSoft  Security SmartERP PeopleSoft  Security
SmartERP PeopleSoft Security
 
SmartERP Oracle Capabilities 2023.pptx
SmartERP Oracle Capabilities 2023.pptxSmartERP Oracle Capabilities 2023.pptx
SmartERP Oracle Capabilities 2023.pptx
 
Best Practices to Modernizing your Oracle Applications
Best Practices to Modernizing your Oracle ApplicationsBest Practices to Modernizing your Oracle Applications
Best Practices to Modernizing your Oracle Applications
 
Manufactures whats keeping you up
Manufactures   whats keeping you upManufactures   whats keeping you up
Manufactures whats keeping you up
 
The Fully Automated Enterprise (RPA)
The Fully Automated Enterprise (RPA)The Fully Automated Enterprise (RPA)
The Fully Automated Enterprise (RPA)
 
Smart erp solutions oracle cloud services overview - 2021 - 2022
Smart erp solutions   oracle cloud services overview - 2021 - 2022Smart erp solutions   oracle cloud services overview - 2021 - 2022
Smart erp solutions oracle cloud services overview - 2021 - 2022
 
PeopleSoft Webinar - Configure vs. Customize Page and Field Configurator
PeopleSoft Webinar - Configure vs. Customize Page and Field ConfiguratorPeopleSoft Webinar - Configure vs. Customize Page and Field Configurator
PeopleSoft Webinar - Configure vs. Customize Page and Field Configurator
 
Alert framework2021
Alert framework2021Alert framework2021
Alert framework2021
 
No One Size Fits All - Form I-9 and E-Verify presentation from the DHS
No One Size Fits All - Form I-9 and E-Verify presentation from the DHSNo One Size Fits All - Form I-9 and E-Verify presentation from the DHS
No One Size Fits All - Form I-9 and E-Verify presentation from the DHS
 
E-Verify for PeopleSoft - Streamline and automate your Employment Authorizati...
E-Verify for PeopleSoft - Streamline and automate your Employment Authorizati...E-Verify for PeopleSoft - Streamline and automate your Employment Authorizati...
E-Verify for PeopleSoft - Streamline and automate your Employment Authorizati...
 
Pre-board Your New Hires for PeopleSoft - Streamline and automate your pre-bo...
Pre-board Your New Hires for PeopleSoft - Streamline and automate your pre-bo...Pre-board Your New Hires for PeopleSoft - Streamline and automate your pre-bo...
Pre-board Your New Hires for PeopleSoft - Streamline and automate your pre-bo...
 
Configure Versus Customize: Using PeopleSoft Page and Field Configurator
Configure Versus Customize: Using PeopleSoft Page and Field ConfiguratorConfigure Versus Customize: Using PeopleSoft Page and Field Configurator
Configure Versus Customize: Using PeopleSoft Page and Field Configurator
 
Managed Services - Small, Medium, or Large - what's the best fit for your org...
Managed Services - Small, Medium, or Large - what's the best fit for your org...Managed Services - Small, Medium, or Large - what's the best fit for your org...
Managed Services - Small, Medium, or Large - what's the best fit for your org...
 
Convert manual paper-based business processes into automated paperless
Convert manual paper-based business processes into automated paperlessConvert manual paper-based business processes into automated paperless
Convert manual paper-based business processes into automated paperless
 
3 steps to successfully analyzing your PeopleSoft Security for Segregation of...
3 steps to successfully analyzing your PeopleSoft Security for Segregation of...3 steps to successfully analyzing your PeopleSoft Security for Segregation of...
3 steps to successfully analyzing your PeopleSoft Security for Segregation of...
 
Alert Framework - Alert your organization to errors, changes, and stalled tra...
Alert Framework - Alert your organization to errors, changes, and stalled tra...Alert Framework - Alert your organization to errors, changes, and stalled tra...
Alert Framework - Alert your organization to errors, changes, and stalled tra...
 
The 6 Biggest Trends for AP Leaders in 2021
The 6 Biggest Trends for AP Leaders in 2021The 6 Biggest Trends for AP Leaders in 2021
The 6 Biggest Trends for AP Leaders in 2021
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

Security & Segregation of Duties for PeopleSoft