This session covers the SQL Server Agent, with its Jobs and Alerts, along with newer features like Database Mail and Extended Events (which is replacing Profiler). You can use SQL Jobs to schedule SQL Scripts and Database Maintenance Plans. Alerts can notify you when jobs or maintenance plans fail. Extended Events can help troubleshoot and improve performance. Profiler preceded Extended Events but hasn’t advanced since 2008. What are some pros and cons of using the independent SQL Server Management Studio with any version from SQL Server 2008 through 2019.

Learning Objective: Know how to have SQL Server send you an email when a backup job fails.                                                                                                                                                                                                                               This session will be available for CPE credits pending completion of session survey post event.

Level: Intermediate

How do you improve GP security without the pain of starting from scratch? Use our practical tips for Dynamics GP! In this fast-paced session, we’ll hit 50 tips designed to make GP more secure. These tips are practical and ready to be applied as soon as you get back.

This session is geared for an audience with a basic skill set.

This session will be available for CPE credits pending completion of session survey post event.

This is a powerful tool.  To often it is thrown in.  What to think about difference between menu groups and security groups for roll based access.  Learn what screens should be used and what the settings mean and effect on what the users see. 

This session will be available for CPE credits pending completion of session survey post event.

Level: Basic

Some companies allowed remote workers in the past, yet others have not until the Coronavirus arrived. Security and access to data, like the rest of your business processes, needs to now be looked at a bit differently. The good news is that it’s likely your company has many techniques in place already, or ready to implement. However, some controls are often overlooked, and a since ‘a chain is only as strong as its weakest link,’ it’s critical all security controls are addressed. Discover commonly overlooked controls and the steps to ensure security is not compromised with a remote work force.

The content of this session is geared toward an audience with beginner to intermediate-level knowledge of the subject area.

This session will be available for CPE credits pending completion of session survey post event. 

How do you know who has access to what?  What are the best practices for managing your BC/NAV security? We’ll discuss how to create a good process to make sure employees can do what they need to and not what they aren’t supposed to.  This session will cover the steps required to set up a new user in BC/NAV.  We’ll also review the processes to assign permissions, manage user groups, set up warehouse security and how to create customized permission sets including a demonstration of the permissions recorder.  Bring your questions, real life stories, and be prepared to share how you manage BC/NAV security in your company.  This session will combine How-To presentations with interactive discussions to share best practices and fresh ideas.

This session will be available for CPE credits pending completion of session survey post event.

Level: Basic 

When establishing security roles in Microsoft D365, it is important to institute a robust security design with minimal security risks resulting from Segregation of Duties (SoD) conflicts and excessive sensitive access. Failure to reduce SoD conflicts and needless SA will result in unexpected risks and audit findings due to a lack of checks and balances in place. The out-of-box security roles inherently contain security risks that when assigned to users, foster a risky environment. In this session, we will discuss security risks, security design, and how to implement the security roles in D365.

The content of this session is geared toward an audience with beginner to intermediate-level knowledge of the subject area.

This session will be available for CPE credits pending completion of session survey post event.

This session is a case study for designing and building an application security framework that supports the needs of a large manufacturing company, and also drives least-privilege access and business ownership of security roles and risks during a D365FO implementation. We will start with an overview of how U.S. Venture, Inc., designed its security roles by building a segregation of duties rule set, and creating compliant task-based roles as the foundation for ensuring appropriate access and proper control throughout the D365 environment. This presentation does not require detailed knowledge of D365 security.The content of this session is geared toward an audience with beginner-level knowledge of the subject area.