Staying ahead of the changing risk landscape is key to the success of many organizations today. For IT, this means an additional area of responsibility that has growing importance. When it comes to JD Edwards, there is a need to ensure business-critical data is protected and the scope of access granted is appropriate. There is no doubt you have a JDE security model in place. But is it effective in isolation? Join our session and learn how risk controls supported by auditable accountability and ownership can keep you one step ahead of the risk and guarantee a robust system access architecture. We'll be sharing ideas about:
• Establishing an Effective System Access Model
• Controlling Risk with Appropriate Change Processes
• Identifying Risk with Auditable Reporting & Alerting
Leave this session with a risk focused roadmap to minimizing legislative risk and nefarious activity to protect your business operations.