BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Q Software - ECPv4.9.14//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:Q Software
X-ORIGINAL-URL:https://www.qsoftware.com
X-WR-CALDESC:Events for Q Software
BEGIN:VTIMEZONE
TZID:UTC
BEGIN:STANDARD
TZOFFSETFROM:+0000
TZOFFSETTO:+0000
TZNAME:UTC
DTSTART:20210101T000000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20210519
DTEND;VALUE=DATE:20210520
DTSTAMP:20260501T184502
CREATED:20210512T121336Z
LAST-MODIFIED:20210512T121336Z
UID:28401-1621382400-1621468799@www.qsoftware.com
SUMMARY:Webinar: Best Practice in Role Design for JD Edwards EnterpriseOne
DESCRIPTION:\n#cmsmasters_button_69f4f4aebf6dc { \n	float:left; \n} \n\n#cmsmasters_button_69f4f4aebf6dc .cmsmasters_button:before { \n	margin-right:.5em; \n	margin-left:0; \n	vertical-align:baseline; \n} \n\n#cmsmasters_button_69f4f4aebf6dc .cmsmasters_button { \n	font-size:16px; \n	font-weight:bold; \n	font-style:normal; \n	border-style:solid; \n	background-color:#e42313;\n	color:#ffffff;\n	border-color:#e42313;\n} \n#cmsmasters_button_69f4f4aebf6dc .cmsmasters_button:hover { \n	background-color:#e42313;\n	color:#ffffff;\n	border-color:#e42313;\n} \n\n#cmsmasters_button_69f4f4aebfa88 { \n	float:left; \n} \n\n#cmsmasters_button_69f4f4aebfa88 .cmsmasters_button:before { \n	margin-right:.5em; \n	margin-left:0; \n	vertical-align:baseline; \n} \n\n#cmsmasters_button_69f4f4aebfa88 .cmsmasters_button { \n	font-size:16px; \n	font-weight:bold; \n	font-style:normal; \n	border-style:solid; \n	background-color:#e42313;\n	color:#ffffff;\n	border-color:#e42313;\n} \n#cmsmasters_button_69f4f4aebfa88 .cmsmasters_button:hover { \n	background-color:#e42313;\n	color:#ffffff;\n	border-color:#e42313;\n} \n\n\n\n\n\n\n\nIs your JD Edwards security holding you back?\nAn outdated security model can make it very difficult to manage security\, which means that technical staff spend too much time resolving access issues and supports calls\, and researching information in response to auditor queries. \nGood role design is the cornerstone of an efficient and sustainable security model. It: \n\nMinimizes security management costs\nGives you flexibility to adapt to business change\nProvides scalability to support business growth.\n\nIn this educational webinar\, Carrie Curry provides practical advice and tips to help you achieve a good role structure. \nShe covers: \n\nWhy good role design is important\nThe principles of proper role design\nThe key steps for designing and implementing roles.\n\nWednesday\, May 19 at 1pm ET and 10am BST\nRegister below for practical advice from an expert in JD Edwards security! \nIf you can’t make the webinar\, register anyway and we’ll send you the recording. \n\nRegister here for North/South America\n  \n\nRegister here for EMEA\n\n\n\n\n\n\n\n\n
URL:https://www.qsoftware.com/event/webinar-role-design-best-practice-05-21/
CATEGORIES:JD Edwards
END:VEVENT
END:VCALENDAR