Join Jeff Hare, CPA CISA CIA, of ERP Risk Advisors, and Garrett Long, VP of Business Development of Zilla Security as they discuss why identity and segregation of duties are the new perimeter.
Overview and other details
Abstract
The traditional security perimeter is evolving as applications, remote access needs, users, and permissions continue to proliferate in the enterprise. This shift requires a reassessment of the traditional security perimeter and a shift in how organizations understand, manage, and mitigate threats to their infrastructure.
Learning Objectives
- The importance of and evolving role of access controls such as Segregation of Duties, and why access controls alone are not sufficient.
- Top identity-related threats facing organizations and how to implement controls to safeguard against cybersecurity, compliance, fraud, data security, and operational risks.
- Overcoming the complexities of managing the constant rate of changes in the enterprise, including those associated with Development, Roles, Patch, and Configuration.
- Best practices for simplifying permissions and role proliferation.
Who is Attending
Jeff Hare, CPA CISA CIA
Jeff’s extensive background includes public accounting (including Big 4 experience), industry, and Oracle Financials experience. Jeff has been working in the Oracle Applications space since 1998 with implementation, upgrade, and support experience. His focus on the development of internal controls and security best practices for companies running ERP Applications. Jeff is a Certified Public Accountant (CPA), a Certified Information Systems Auditor (CISA), and a Certified Internal Auditor (CIA).
Jeffrey has worked in various countries including Austria, Australia, Brazil, Canada, Germany, Ireland, Mexico, Panama, Saudi Arabia, United Kingdom, and United Arab Emirates. He is a graduate of Arizona State University and lives in northern Colorado with his wife and three daughters.
Specialties: Risk advisory services for organizations using ERP Applications. Internal controls and security design and implementation services. GRC-related software selection and implementation services.