Note that the below is a link to a free podcast offered by The Tambellini Group as part of our ongoing strategic partnership. For more information on this partnership and The Tambellni Group, please visit here . Host Katelyn Ilkani talks with Helen Patton, Associate Vice President and...
Note that the below is a link to a free podcast offered by The Tambellini Group as part of our ongoing strategic partnership. For more information on this partnership and The Tambellni Group, please visit here . West Virginia University’s CISO Alex Jalso shares thoughts on information...
At the University of Queensland, Campus Solutions staff user security was redesigned/rebuilt as part of our upgrade to CS8.9. Since then the basic model had not been revised. A security review was undertaken as part of the preparation for our upgrade to CS9.2. The review revealed a complex web...
2 attachments
Cybercriminals are finding ways to attack institutions for their personal gain. From millions of dollars transferred to fraudsters through spear phishing, to grading frauds, to the theft and sale of credentials and academic research, the threats to institutions are real and increasing. Have a...
Data Privacy White Paper
HEUG DataPrivacy WhitePaper.pdf
Oracle Service Cloud is an open platform by design, by default allowing many ways to look at information on a contact to give agents a clear picture of a contact. This presentation is about a Case Management System that we successfully built on top of the customer portal, which needs to be built...
Simon will talk about how the University of Cambridge has provided their PeopleSoft Campus Solutions users with: • a new simplified user access request process • transparency around the access they have, and can request • the ability for key super-users to approve and audit who has access to...
NeSIS, a multi-institutional implementation of Campus Solutions, wanted to empower the campus security coordinators to configure security for customers as well as ensure the high power roles were evaluated centrally before being assigned in production environments. The Role Restriction...
Overview for those non-security folks in the room about roles and permission lists and User profiles. Then into the different methods of setting up roles and data permissions, data masking, distributed User Security, query security roles and other dynamic methods. Covering Campus Solutions, and...
SCI-PS Sec for All.pdf
Security in PeopleSoft 9.0 or above is like a set of Nesting Dolls. Complementary layers support each other to develop an access profile for each user. We will discuss each layer beginning with Permission Lists and ending with the unique way we are using to request access for staff.
Security for October 2017.pptx
Finance
HCM
Student Systems
CRM
Technical
Careers
Alliance
International / Regional
E-Academy
Attendee Terms & Policies
HEUG Code of Conduct
Finance | HCM | Student Systems | CRM | Technical | Careers
Alliance / International / Regional / E-Academy