BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Q Software - ECPv4.9.14//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Q Software
X-ORIGINAL-URL:https://www.qsoftware.com
X-WR-CALDESC:Events for Q Software
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20200101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20201019
DTEND;VALUE=DATE:20201023
DTSTAMP:20260513T195310
CREATED:20200914T111224Z
LAST-MODIFIED:20201015T100402Z
UID:21582-1603065600-1603411199@www.qsoftware.com
SUMMARY:INFOCUS 20
DESCRIPTION: \n#cmsmasters_row_6a04d6a65f284 .cmsmasters_row_outer_parent { \n	padding-top: 0px; \n} \n\n#cmsmasters_row_6a04d6a65f284 .cmsmasters_row_outer_parent { \n	padding-bottom: 50px; \n} \n\n\n\n\n\n\n\n\nJoin us online at INFOCUS 20!\nIt’s all new\, all digital this year for INFOCUS 20! Dive deep into JD Edwards learning\, chat with the experts\, connect with other users and meet the solutions providers. Join us online! \nIf you’re attending INFOCUS 20\, visit us to find out how to: \n\nCut JD Edwards security costs: Implement and manage efficient\, scalable Roles-based security in a fraction of the time\nCut audit and SOX compliance costs: Easy-to-use Segregation of Duties and security auditing delivers accurate results within hours.\n\nWe offer on-premise and Cloud-based Audit\, Compliance and Security Tools and Services for JD Edwards. \nRegister for the conference here! \nLive in-booth demo sessions\nDate & TimeBooth SessionPresented ByOctober 20 at 10:30am ETHow to conduct Access Reviews in JDE E1 with a fraction of the effort and costTres Paul\, Technical Director\,\n \nQ SoftwareOctober 20 at 12:15pm ETAutomated\, repeatable Segregation of Duties and audit reporting in JDE E1Tres Paul\, Technical Director\,\nQ SoftwareOctober 20 at 3:15pm ETFind weak spots in your JDE security within hoursTres Paul\, Technical Director\,\nQ SoftwareOctober 21 at 10:30am ETThe quick way to implement compliant\, Role-based Security in JDE E1Preston Leftwich\, Technical Manager\,\nQ SoftwareOctober 21 at 12:45pm ETHow to conduct Access Reviews in JDE E1 with a fraction of the effort and costTres Paul\, Technical Director\,\nQ SoftwareOctober 21 at 4:00pm ETAutomated\, repeatable Segregation of Duties and audit reporting in JDE E1Tres Paul\, Technical Director\,\nQ SoftwareOctober 22 at 10:30am ETThe quick way to implement compliant\, Role-based Security in JDE E1Preston Leftwich\, Technical Manager\,\nQ SoftwareOctober 22 at 1:15pm ETFind weak spots in your JDE security within hoursTres Paul\, Technical Director\,\nQ Software\n\nAudit and Security related Education Sessions:\n104640: Efficient JD Edwards Security & Audit: Different Strokes for Different Folks\nTuesday\, October 20\, 16:00 – 17:00pm ET\nPresented by Mike Ward\, Q Software \nWe all know the frustrations of JDE security; it’s complex\, longwinded & repetitive. But managed well\, it can be good at stopping inappropriate access. \nBut “managed well” is problematic.  How to achieve Best Practice?  Make maintenance & troubleshooting easy? Satisfy the auditor? \nOrganizations have different security needs\, so now we offer 2 approaches\, both packed with productivity tools.  Our new solution lets you manage security directly on the 950 much more efficiently.  Or if you need advanced tools for ultra-efficient management & proactive SoD checks\, we’ve also improved Security Manager Pro. \nJoin us as we share best practices & outline alternative solutions to implement them rapidly in the way that works best for you: \n\nImplement standard roles in a day\nSegregation of Duties: check for conflicts before you allocate security\nProblems that auditors look out for\nUser stories: the main gotchas\nThe Security Lifecyle\nSimplify 950 Maintenance: 2 routes to efficiency.\n\nLearning objectives: \n\nHow to build a Security Implementation Plan\nHow to satisfy the Auditors\nHow to create sustainable Internal Controls\nHow to reduce security maintenance costs by up to 50%.\n\n101170: Crossing Enemy Lines – An IT compliance team’s view on your company’s audit requirements\nWednesday\, October 21\, 1:45-2:45pm ET\nPresented by John Souza\, Switch\, Ltd. & Carrie Curry\, Q Software \nThe expectation to create controls that both meet the needs of the business and all the relevant compliance concerns is increasingly becoming more complicated. The business wants quick\, easy and convenient while the auditors and compliance function want structure\, paperwork and an audit trail. \nDuring this session\, we will walk through an internal auditor’s experience in how to structure and identify an access management program that meets both demands and how to avoid the most common pitfalls of audit/compliance issues. We will also cover how the business\, IT security professionals and auditors can work together to get it right the first time or hit the reset button on an established access security program. \nDuring this session we will cover specific topics such as user administration\, security change management\, audit and compliance reporting\, along with fraud detection. We will discuss security team responsibilities (what you should expect) and why security tools are essential. \nObjectives of the session: \n\nPractical approach to audit/compliance requirements in an information security program while maintaining business processes efficiencies\nDiscuss the most common JD Edwards system-based internal controls\, automated processes\, documentation and monitoring for IT General Controls\nShare the planning that Switch used for the project\, challenges faced\, and obstacles overcome. We’ll finish up with successes and goals achieved by having the proper risk management system and controls in place.\n\n101130: Carr Properties: Leveraging Technology to Achieve Scale and Efficiency\nWednesday\, October 21\, 3:00-4:00pm ET\nPresented by Ilan Zachar\, Carr Properties & Mike Ward\, Q Software \nCarr is a privately-held real estate company that owns and manages 16 high-quality commercial properties in the greater DC area totaling over 3.6 million square feet.  JP Morgan is its largest investor. Ilan Zachar\, IT Director\, will share how Carr needed to make a meaningful investment of both time and money in JDE and auditing solutions to help them scale efficiently and effectively and achieve their strategic organizational objectives. \nObjectives of the session: \n\nShow how process automation was used to increase efficiencies\, enable greater data sharing\, and obtain a single source of truth for critical business data\nLearn how Carr established JDE as the system of record\, with easy to enforce SOD\, change management processes\, and audit trails\nDemonstrate how organizational growth objectives to quickly and efficiently scale the business were obtained by Carr’s investment in information systems.\n\n102040: JD Edwards Security Audit in the Cloud – Be Prepared for the Auditors!\nWednesday\, October 21\, 5:30-6:00pm ET\nPresented by Jennifer Leatherman\, CTB\, Inc. & Mike Ward\, Q Software \nCTB Inc.\, a leading global designer\, manufacturer and marketer of agricultural systems and solutions\, is now prepared for the dreaded IT Audit on JD Edwards security. IT security audits have always been dreaded\, at best. We ask ourselves which SoD will be the target this time? Did we miss a level of risk even the auditors didn’t think of? Did we audit and review frequently enough? This presentation is a look at CTB’s journey to overcoming a lack of resources\, a lack of knowledge related to true security risks and taking advantage of a Cloud-based solution that solved all of these problems. This presentation will share their accomplishments in a few short months and how CTB was able to reduce JDE security setup and maintenance time by implementing and monitoring the ‘rules’. \nObjectives of the session: \n\nIdentify the main obstacles to a successful JDE security audit at CTB and the areas that continued to remain a problem in each audit\nShare the baseline analysis at implementation of Q Software’s QCloud solution that identified more risk than CTB realized existed. Share how CTB used the tool to improve security setup and reduce risk\nShare CTB’s new policy for auditing\, reviewing and approving JD Edwards security setup in a timely manner.\n\nHave a great conference! We hope to see you there.\n \n\n\n\n\n\n\n\n\n
URL:https://www.qsoftware.com/event/infocus20/
CATEGORIES:JD Edwards
END:VEVENT
END:VCALENDAR