Format: Online
Exclusive sponsor is: Fastpath, now part of Delinea
In today’s world of interconnected systems and users from inside and outside organizations, it is more important than ever to secure resources and have a strong security posture to mitigate external and internal threats to systems and data. However, the security of ERP and other business applications is sometimes overlooked in the broader strategy for securing companies assets. In this webinar, we will dive into the importance of strong controls around business application security, and how best they can be integrated into a broader security program to ensure true enterprise security. With internal threats from weak internal controls on the rise, including weak security in business applications, it is important for organizations to act today. We will review how best to address these weaknesses and approaches to ensure the business application owners of ERP, HCM, and CRM systems are isolated when it comes to securing their assets and protecting data. True enterprise security requires the mitigation of risk from both external and internal threats. These internal threats can be users of your business applications, including third parties who have access to them. Join us to learn more about best practices for securing your applications and including these approaches to improve the overall security posture of your company.
DATE: December 5, 2024
TIME: 12:00 PM-1:00 PM ET
One (1) NASBA CPE will only be awarded to participants on the live broadcast who are logged in for a minimum of 50 minutes and engage on at least three poll questions per each hour of the event.
Keep scrolling to register.
SPEAKER
Frank Vukovits, CISA, CIA
Frank is Chief Security Scientist at Delinea. He has over three decades of experience as an auditor and security professional, along with corporate IT executive management. Frank holds Certified Internal Auditor (CIA) and Certified Information System Auditor (CISA) designations, and passed the CISSP exam in 2001. He is a frequent speaker at audit (IIA), IT audit (ISACA), software publishers, security, and user group events.