GRC

[316 Matches Found]
Page 1 of 16         1 2 3 4 5 6 7 8 9 10      
Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. April 7, 2017
SAP Professional Journal/Financials – 
Joshu Madina explains the process of Information Lifecycle Management (ILM) enablement for SAP Access Control 10.1. He also provides you with details regarding blocking personal data after the residence period by limiting access, and the destruction of personal data after the retention period.

Article icon
by Nibha Kumari, SAP Security Expert, Cintas Corporation | Gary Prewett, Security Practice Lead, NIMBL March 14, 2017
SAP Professional Journal/Financials/SCM – 

Segregation of duties (SoD) risks will not be detected by an out-of-the box SAP system rule set if your organization implements Master Data Governance (MDG).
Nibha Kumari and Gary PrewettIf show how to get a complete picture of SoD risks by modifying the rule set to detect cross-system risks associated with material, customer, and vendor master data maintenance in the MDG system.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. February 24, 2017
SAP Professional Journal/Financials – 
Kehinde Eseyin describes the technical architectural design, setup, and implementation of SAP Fiori in the SAP GRC environment as it relates to SAP Access Control, SAP Risk Management, and SAP Process Control applications.

Article icon
by Neha Garg, Senior Developer, SAP Labs India Pvt. Ltd. January 12, 2017
SAP Professional Journal/Financials – 

Neha Garg explains what SAP Cloud Identity Access Governance is and what organizations can expect to gain from SAP Cloud Identity Access Governance and its newly released SAP Cloud Identity Access Governance, access analysis service in comparison with SAP Access Control.


Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. December 16, 2016
SAP Professional Journal/Financials/HR – 

Joshu Madina explains the process of identifying invalid mitigation assignments for user-level mitigations and role-level mitigations. He also provides you with details regarding extending the validity for expired mitigations and deleting invalid mitigation assignments.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. October 27, 2016
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how SAP Audit Management can help improve the audit execution and follow-up activities while enforcing process control and risk management.


Article icon
by Hernan Huwyler, Risk Management and Internal Control Director, Veolia September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Juan Pablo Perez-Etchegoyen, CTO, Onapsis September 2, 2016
SAP Professional Journal/Financials – 
Juan Pablo Perez-Etchegoyen explains the details of the United States Computer Emergency Readiness Team (US-CERT) alert TA16-132A issued by the US Department of Homeland Security (DHS) and the vulnerability that triggered it. He also describes the mitigation steps that organizations using SAP systems need to follow to close the security gap potentially opened by this vulnerability.

Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. August 15, 2016
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how SAP Audit Management can help improve the different facets of the internal audit life cycle including audit planning and preparation while enforcing process control and risk management.


Video icon
Financials/SAP Professional Journal – 

Many companies use solutions like SAP Access Control to analyze user access before roles are assigned and then report suspect activity to business owners. In this video, you'll see how leading companies are moving from reporting on these “potential” segregation of duties (SoD) violations to calculating their actual financial exposure by leveraging SAP Access Violation Management.

 


Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. April 14, 2016
SAP Professional Journal/Financials – 

Kehinde Eseyin explains how to configure an SAP Enterprise Threat Detection (SAP ETD) system and set up the SAP NetWeaver ABAP system as a log provider for enhanced log mining, threat detection, improved system security, and forensic investigation.


Article icon
by Vinay Gupta, Senior Software Engineer, SAP Labs India Pvt. Ltd. February 8, 2016
SAP Professional Journal/Financials – 

Vinay Gupta explains how to certify roles and different attributes in role certification. He also provides you with details regarding role certification jobs.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. January 4, 2016
SAP Professional Journal/Financials – 

In part 2 of his series, Kehinde Eseyin corrects assumptions about the SAP Access Control system that are not necessarily true and provides guidance on how to meet specific complex business requirements during an implementation project, including maintenance and support activities.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. December 14, 2015
SAP Professional Journal/Financials – 

Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. Kehinde Eseyin shows how to configure the system correctly to achieve your defined business requirements.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. November 16, 2015
Financials – 

Kehinde Eseyin shows how to configure SAP Fraud Management for easy detection, investigation, and prevention of fraudulent activities within your enterprise system using standard business contents.


Article icon
by Akansha Gupta, Senior Developer in SAP: Access Control, SAP Labs India Pvt. Ltd. September 28, 2015
SAP Professional Journal/Financials – 

SAP Access Control provides you with the option to create a supplementary rule. The rule gives additional information to prevent a false conflict in a segregation of duties (SoD) risk analysis report. Akansha Gupta outlines the steps you need to complete to enable the supplementary rule.


Article icon
by Sonia Sohal, Senior Developer for SAP Access Control, SAP Labs India Pvt. Ltd. September 9, 2015
SAP Professional Journal/HR/Financials – 

Sonia Sohal walks you through the steps to create an organization rule in SAP Access Control. She also explains the benefits of the Organization Rule Creation Wizard over the traditional approach of maintaining organization rules manually.


Article icon
by Mary Loughran, Independent Consultant June 19, 2015
Financials – 
Mary Loughran describes the use and configuration of SAP’s Market Risk Analyzer sub-module. She provides you with an overview of how companies can benefit from using Market Risk Analyzer. She also describes the key inputs and outputs of the reports from both business and technical perspectives.

Article icon
by Jitan Batra, Senior Developer for SAP Access Control and Process Control, SAP Labs India, Pvt. Ltd. June 1, 2015
SAP Professional Journal/Financials – 

Jitan Batra compares the enhanced alerts in Access Control 10.0 and 10.1 with Access Control 5.x releases. From the 10.x release and on alerts are generated only when an access risk is satisfied at the permission level, which eradicates false positive alerts. An example illustrates the enhanced alerts.


Page 1 of 16         1 2 3 4 5 6 7 8 9 10