Archived Events
In this webinar, attendees learned about:
Best Practices for Automating Student Enrollment Processes: Discovered how to automate student enrollment workflows in PeopleSoft to reduce manual effort and eliminate bottlenecks.
How to Secure Identities Without Burdening IT ...
In this webinar, attendees learned about:
What end of maintenance for SAP IDM and SAP AC 12.0 means for them
The risks of failing to migrate to a new solution prior to the sunsetting of maintenance
How to build a realistic transition roadmap and key timing and phases to ...
Attendees joined Pathlock experts Jordan Tunks and Rajesh Rengarethinam to discuss:
Implementing dynamic data masking controls to protect sensitive SAP data against exploit by internal and external threats
Best practices for using Attribute-Based Access Controls ...
In this webinar, attendees will have:
Watched practical attack scenarios that lead to system manipulation, data breach, or loss of control which are not covered by traditional SoD controls
Learned how to plan, implement, and continuously secure their business-critical ...
In this webinar, attendees learned:
How to overcome internal control siloes and the increasing Importance of Cross-Application GRC
Overcoming challenges posed by elevated or privileged access requirements
Why Continuous Controls Monitoring should be at the heart of ...
During this Pathlock and Carahsoft webinar, attendees heard from top security experts on how you can expand your SAP security strategy to layers below the network to include vulnerability management, dynamic authorization (zero trust), and data loss prevention - all from a single platform.
During this Pathlock and Carahsoft webinar, attendees heard from top security experts on how you can expand your SAP security strategy to layers below the network to include vulnerability management, dynamic authorization (zero trust), and data loss prevention - all from a single platform.
Attendees learned how they can: Reduce enterprise-wide access governance costs by standardizing SOD control processes in cross-app business activitiesPrevent SOD conflicts at the start by ensuring SOD-compliant provisioning across applicationsClearly articulate the financial exposure ...