BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Q Software - ECPv4.9.14//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Q Software
X-ORIGINAL-URL:https://www.qsoftware.com
X-WR-CALDESC:Events for Q Software
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20210101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210630
DTEND;VALUE=DATE:20210701
DTSTAMP:20260308T235233
CREATED:20210621T142044Z
LAST-MODIFIED:20210621T142426Z
UID:28649-1625011200-1625097599@www.qsoftware.com
SUMMARY:Webinar: Combating Common Application Risks - Configuration
DESCRIPTION:\n#cmsmasters_button_69ae0bc12ae39 { \n	float:left; \n} \n\n#cmsmasters_button_69ae0bc12ae39 .cmsmasters_button:before { \n	margin-right:.5em; \n	margin-left:0; \n	vertical-align:baseline; \n} \n\n#cmsmasters_button_69ae0bc12ae39 .cmsmasters_button { \n	font-size:16px; \n	font-weight:bold; \n	font-style:normal; \n	border-style:solid; \n	background-color:#e42313;\n	color:#ffffff;\n	border-color:#e42313;\n} \n#cmsmasters_button_69ae0bc12ae39 .cmsmasters_button:hover { \n	background-color:#e42313;\n	color:#ffffff;\n	border-color:#e42313;\n} \n\n#cmsmasters_button_69ae0bc12b142 { \n	float:left; \n} \n\n#cmsmasters_button_69ae0bc12b142 .cmsmasters_button:before { \n	margin-right:.5em; \n	margin-left:0; \n	vertical-align:baseline; \n} \n\n#cmsmasters_button_69ae0bc12b142 .cmsmasters_button { \n	font-size:16px; \n	font-weight:bold; \n	font-style:normal; \n	border-style:solid; \n	background-color:#e42313;\n	color:#ffffff;\n	border-color:#e42313;\n} \n#cmsmasters_button_69ae0bc12b142 .cmsmasters_button:hover { \n	background-color:#e42313;\n	color:#ffffff;\n	border-color:#e42313;\n} \n \n#cmsmasters_row_69ae0bc12b2d8 .cmsmasters_row_outer_parent { \n	padding-top: 0px; \n} \n\n#cmsmasters_row_69ae0bc12b2d8 .cmsmasters_row_outer_parent { \n	padding-bottom: 50px; \n} \n\n\n\n\n\n\n\n\nGaps in application security can lead to fraudulent activity\, so it’s crucial to understand the common application risks in JD Edwards\, and how to combat them. \nIn this webinar for JD Edwards EnterpriseOne users\, security and audit consultants Carrie Curry and Preston Leftwich discuss common risks resulting from Configuration items not being properly and appropriately secured. \nTo prevent security misconfiguration issues and unauthorized access\, it is essential to understand: \n\nThe risks associated with access to configuration items\nControls related to access\nCommon Segregation of Duties rules associated with configuration items\nHow to identify users with Access to Configuration items\nCommon operational issues and compensating controls.\n\nThis session will discuss risks in configuration items related to: \n\nOrder Activity Rules\nCompany and Business Units\nAutomated Accounting Instructions\nFiscal Periods\nPost Security Constants\nUser Defined Codes\nPayee Control.\n\nJoin Carrie and Preston to hear practical advice to help you combat these common configuration risks. \nWednesday\, June 30 at 2pm ET and 10am BST\nIf you can’t make the webinar\, register anyway and we’ll send you the recording. \n\nRegister here for North/South America\n  \n\nRegister here for EMEA\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
URL:https://www.qsoftware.com/event/webinar-combating-common-application-risks-configuration/
CATEGORIES:JD Edwards
END:VEVENT
END:VCALENDAR