GRC

[324 Matches Found]
Page 1 of 17         1 2 3 4 5 6 7 8 9 10      
Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. December 29, 2017
SAP Professional Journal/Financials – 

Joshu Madina explains the process of Firefighter ID review request creation, assignment reviews, and removal of the Firefighter ID assignments from firefighters. He also provides you with details regarding setting up the workflows for the Firefighter ID reviews.


Article icon
by Bhupinder Singh Gahunia, Senior Developer, SAP Process Control, SAP Labs India Pvt. Ltd. December 12, 2017
SAP Professional Journal/Financials – 

Bhupinder Singh Gahunia explains how business process owners can create, plan, execute, and document control performance plans using the Manual Control Performance functionality in SAP Process Control 10.1.


Article icon
by Neha Garg, Senior Developer, SAP Labs India Pvt. Ltd. December 11, 2017
SAP Professional Journal/Financials – 

Neha Garg explains how to keep mitigation control data integrated, effective, and valid in both SAP Access Control and SAP Process Control.


Article icon
by Suman Puthadi, Associate Architect, SAP Labs India Pvt. Ltd. December 11, 2017
SAP Professional Journal/Financials – 

Suman Puthadi explains the steps for the mass maintenance of mitigation control owners. He also explains the steps for the mass maintenance of risk owners across Access Request Management.


Article icon
by Gitu Bijlani, Senior Developer, SAP Labs India Pvt. Ltd. December 4, 2017
SAP Professional Journal/Financials – 

Gitu Bijlani describes a Business Add-In (BAdI) for the Repository object synchronization program. She also provides use-case details about how to use this BAdI.


Article icon
by Vinay Gupta, Senior Software Engineer, SAP Labs India Pvt. Ltd. October 23, 2017
SAP Professional Journal/Financials/HR – 

Ticketing functionality enables role designers to track all role changes using ticket numbers. After you enable ticketing functionality, when a role designer changes a role, a pop-up prompts the designer to enter a ticket number. This ticket number is used in all phases of role methodology, role copy, and mass maintenance. A new tab, Ticket Number, has been added to the Additional Details tab of the role. Vinay Gupta describes this new feature that was introduced in SAP Access Control 10.1.


Article icon
by Jan Gardiner, Senior Director, GRC Solutions, SAP Labs, LLC | Matt Hartnett, SAP Security and SAP Process Control Consultant August 28, 2017
SAP Professional Journal/Financials/HR/SCM – 

SAP Process Control provides a popular alternative to online completion of assessment surveys, tests of effectiveness, and other surveys—SAP Interactive Forms by Adobe. These offline forms are easy to use but can be initially challenging to set up and test. Jan Gardiner and Matt Hartnett present an end-to-end guide that will help you configure, deploy, and manage the offline forms.


Quick tips icon
by Andrea Haynes, Group Editor, SAP Experts August 8, 2017
SAP Professional Journal/Financials/HR – 

Raymond Mastre, a director at PwC and a speaker at the GRC 2017 SAPinsider conference in Las Vegas, discusses SAP system security.



Article icon
SAP Professional Journal/BI/Financials/HR/SCM – 

Hernan Huwyler goes over the particular requirements for reviewing the user and database access in your SAP system to prepare for the new General Data Protection Regulation (GDPR) in the European Union. Controls should be reinforced on user and database rights to access tables with personal information. Documentation, validation, and coordination should also be more comprehensive. 


Article icon
by Nibha Kumari, SAP Security Expert, Cintas Corporation | Gary Prewett, Security Practice Lead, NIMBL March 14, 2017
SAP Professional Journal/Financials/SCM – 

Segregation of duties (SoD) risks will not be detected by an out-of-the box SAP system rule set if your organization implements Master Data Governance (MDG).
Nibha Kumari and Gary PrewettIf show how to get a complete picture of SoD risks by modifying the rule set to detect cross-system risks associated with material, customer, and vendor master data maintenance in the MDG system.


Article icon
by Kehinde Eseyin, Security Architect February 24, 2017
SAP Professional Journal/Financials – 
Kehinde Eseyin describes the technical architectural design, setup, and implementation of SAP Fiori in the SAP GRC environment as it relates to SAP Access Control, SAP Risk Management, and SAP Process Control applications.

Article icon
by Neha Garg, Senior Developer, SAP Labs India Pvt. Ltd. January 12, 2017
SAP Professional Journal/Financials/HR – 

Neha Garg explains what SAP Cloud Identity Access Governance is and what organizations can expect to gain from SAP Cloud Identity Access Governance and its newly released SAP Cloud Identity Access Governance, access analysis service in comparison with SAP Access Control.


Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. December 16, 2016
SAP Professional Journal/Financials/HR – 

Joshu Madina explains the process of identifying invalid mitigation assignments for user-level mitigations and role-level mitigations. He also provides you with details regarding extending the validity for expired mitigations and deleting invalid mitigation assignments.


Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how SAP Audit Management can help improve the audit execution and follow-up activities while enforcing process control and risk management.


Article icon
by Hernan Huwyler, Risk and Compliance Expert September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Juan Pablo Perez-Etchegoyen, CTO, Onapsis September 2, 2016
SAP Professional Journal/Financials – 
Juan Pablo Perez-Etchegoyen explains the details of the United States Computer Emergency Readiness Team (US-CERT) alert TA16-132A issued by the US Department of Homeland Security (DHS) and the vulnerability that triggered it. He also describes the mitigation steps that organizations using SAP systems need to follow to close the security gap potentially opened by this vulnerability.

Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how SAP Audit Management can help improve the different facets of the internal audit life cycle including audit planning and preparation while enforcing process control and risk management.


Video icon
Financials/SAP Professional Journal – 

Many companies use solutions like SAP Access Control to analyze user access before roles are assigned and then report suspect activity to business owners. In this video, you'll see how leading companies are moving from reporting on these “potential” segregation of duties (SoD) violations to calculating their actual financial exposure by leveraging SAP Access Violation Management.

 


Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin explains how to configure an SAP Enterprise Threat Detection (SAP ETD) system and set up the SAP NetWeaver ABAP system as a log provider for enhanced log mining, threat detection, improved system security, and forensic investigation.


Page 1 of 17         1 2 3 4 5 6 7 8 9 10