We all know the Data Lake and Azure Synapse is on Microsoft’s road-map for D365FO. Join Azure Synapse and Data Lake experts to learn more about this exciting technology and how it can transform you business into a data-driven organization!  Learn how the Canada Goose company is using these business intelligence tools enhance productivity in the company.

The content of this session is geared toward an audience with an intermediate-level knowledge of the subject area.

This session will be available for CPE credits pending completion of session survey post event.

Business Central Configuration Packages are a convenient, powerful tool for importing data into Business Central.  But they are more than just a data migration tool!

In this session learn how to use Configuration Packages, how to prepare data for import, and learn a few neat features, tricks, and limitations of Configuration Packages that will help you better understand and navigate Business Central data.

•What are Configuration Packages?
•How to setup a Configuration Package
•How to prepare data for import into Business Central
•Testing your Configuration Packages
•Reviewing errors, correcting errors, and applying package data
•Performance considerations  
This session will be available for CPE credits pending completion of session survey post event.

Level: Basic 

In this presentation I plan to show, what is FetchXML. Simply Created with Advanced Find, and more powerfully with XrmToolBox’s FetchXML Builder.  I will compare the two, strengths and weaknesses, and demonstrate how to use them to get data out of Dynamics 365.  So after we have created the FetchXML, I will demonstrate how to FetchXML in SSRS, C# code for Console Apps, and Liquid in Portal Pages.

The content of this session is geared toward an audience with intermediate-level knowledge of the subject area.

How much Data is too much? Are smartlists and reports running at a snail’s pace?

Let’s discuss Data clean up and Maintenance practices.

We’ll cover GP Utilities and Routines that can assist.

We’ll review GP data archiving options.

This session is geared for an audience with an intermediate skill set.

This session will be available for CPE credits pending completion of session survey post event.

This session covers the SQL Server Agent, with its Jobs and Alerts, along with newer features like Database Mail and Extended Events (which is replacing Profiler). You can use SQL Jobs to schedule SQL Scripts and Database Maintenance Plans. Alerts can notify you when jobs or maintenance plans fail. Extended Events can help troubleshoot and improve performance. Profiler preceded Extended Events but hasn’t advanced since 2008. What are some pros and cons of using the independent SQL Server Management Studio with any version from SQL Server 2008 through 2019.

Learning Objective: Know how to have SQL Server send you an email when a backup job fails.                                                                                                                                                                                                                               This session will be available for CPE credits pending completion of session survey post event.

Level: Intermediate

How do you improve GP security without the pain of starting from scratch? Use our practical tips for Dynamics GP! In this fast-paced session, we’ll hit 50 tips designed to make GP more secure. These tips are practical and ready to be applied as soon as you get back.

This session is geared for an audience with a basic skill set.

This session will be available for CPE credits pending completion of session survey post event.

This is a powerful tool.  To often it is thrown in.  What to think about difference between menu groups and security groups for roll based access.  Learn what screens should be used and what the settings mean and effect on what the users see. 

This session will be available for CPE credits pending completion of session survey post event.

Level: Basic

Some companies allowed remote workers in the past, yet others have not until the Coronavirus arrived. Security and access to data, like the rest of your business processes, needs to now be looked at a bit differently. The good news is that it’s likely your company has many techniques in place already, or ready to implement. However, some controls are often overlooked, and a since ‘a chain is only as strong as its weakest link,’ it’s critical all security controls are addressed. Discover commonly overlooked controls and the steps to ensure security is not compromised with a remote work force.

The content of this session is geared toward an audience with beginner to intermediate-level knowledge of the subject area.

This session will be available for CPE credits pending completion of session survey post event. 

How do you know who has access to what?  What are the best practices for managing your BC/NAV security? We’ll discuss how to create a good process to make sure employees can do what they need to and not what they aren’t supposed to.  This session will cover the steps required to set up a new user in BC/NAV.  We’ll also review the processes to assign permissions, manage user groups, set up warehouse security and how to create customized permission sets including a demonstration of the permissions recorder.  Bring your questions, real life stories, and be prepared to share how you manage BC/NAV security in your company.  This session will combine How-To presentations with interactive discussions to share best practices and fresh ideas.

This session will be available for CPE credits pending completion of session survey post event.

Level: Basic 

When establishing security roles in Microsoft D365, it is important to institute a robust security design with minimal security risks resulting from Segregation of Duties (SoD) conflicts and excessive sensitive access. Failure to reduce SoD conflicts and needless SA will result in unexpected risks and audit findings due to a lack of checks and balances in place. The out-of-box security roles inherently contain security risks that when assigned to users, foster a risky environment. In this session, we will discuss security risks, security design, and how to implement the security roles in D365.

The content of this session is geared toward an audience with beginner to intermediate-level knowledge of the subject area.

This session will be available for CPE credits pending completion of session survey post event.

This session is a case study for designing and building an application security framework that supports the needs of a large manufacturing company, and also drives least-privilege access and business ownership of security roles and risks during a D365FO implementation. We will start with an overview of how U.S. Venture, Inc., designed its security roles by building a segregation of duties rule set, and creating compliant task-based roles as the foundation for ensuring appropriate access and proper control throughout the D365 environment. This presentation does not require detailed knowledge of D365 security.The content of this session is geared toward an audience with beginner-level knowledge of the subject area.