Home / Educational Content / PeopleSoft / RECONNECT 24: Practical Guide to Eliminating Risk in Priviledged and Third-Party Access in PeopleSoft

RECONNECT 24: Practical Guide to Eliminating Risk in Priviledged and Third-Party Access in PeopleSoft

While phishing attacks on self-service users are a significant threat to PeopleSoft environments, the compromise of privileged user and third-party credentials poses the most severe risk.
To make matters worse, most PeopleSoft Admin and IT Teams use shared credentials, which makes investigation of any security incident that much more complicated. It’s these moments when putting a face/name of a person to a specific action is of the utmost importance.
Join us as PeopleSoft Security expert, Greg Wendt discusses and demonstrates PeopleSoft Privileged Access Management (PAM) by Pathlock.

Watch the full-length video

You’ve reached the ultimate Oracle customer network—exclusively for Quest Corporate and Professional members.

Join Quest to unlock access to strategic content centers, event replays, exclusive programming, and expert insights—all designed to help Oracle users like you go further, faster.

Whether you're on JD Edwards, PeopleSoft, or Oracle Cloud, Quest connects you with a powerful peer network and Oracle experts so you can make smarter decisions, drive innovation, and get more from your investment.

Quest is where Oracle customers connect, learn, and lead with confidence. Ready to join them?

RECONNECT 24: Practical Guide to Eliminating Risk in Priviledged and Third-Party Access in PeopleSoft