GRC

[356 Matches Found]
Page 1 of 18         1 2 3 4 5 6 7 8 9 10      
Article icon
by Jan Gardiner, Senior Director, GRC Solutions, SAP Labs, LLC | Matt Hartnett, SAP Security and SAP Process Control Consultant August 28, 2017
SAP Professional Journal/Financials – 

SAP Process Control provides a popular alternative to online completion of assessment surveys, tests of effectiveness, and other surveys—SAP Interactive Forms by Adobe. These offline forms are easy to use but can be initially challenging to set up and test. Jan Gardiner and Matt Hartnett present an end-to-end guide that will help you configure, deploy, and manage the offline forms.


Article icon
SAP Professional Journal/BI/Financials/HR/SCM – 

Hernan Huwyler goes over the particular requirements for reviewing the user and database access in your SAP system to prepare for the new General Data Protection Regulation (GDPR) in the European Union. Controls should be reinforced on user and database rights to access tables with personal information. Documentation, validation, and coordination should also be more comprehensive. 


Article icon
by Vinay Gupta, Senior Software Engineer, SAP Labs India Pvt. Ltd. July 6, 2017
SAP Professional Journal – 

Role administrators and designers need the ability to update a business role to add or remove a technical role association of a business role while still leaving the approved or active version of the business role to use in Access Request Management and Access Risk Analysis. Business role versioning provides the flexibility to provision an approved version of a business role in Access Request Management. In business role versioning, only the addition and the removal of roles are available for versioning. 


Article icon
by Kehinde Eseyin, Security Architect June 14, 2017
SAP Professional Journal/BI – 

Kehinde Eseyin shows how to activate tracing to resolve authorization errors in SAP HANA. You then can troubleshoot authorization errors related to repository role activation, SQL privileges, and analytical privileges.


Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. April 7, 2017
SAP Professional Journal/Financials – 
Joshu Madina explains the process of Information Lifecycle Management (ILM) enablement for SAP Access Control 10.1. He also provides you with details regarding blocking personal data after the residence period by limiting access, and the destruction of personal data after the retention period.

Article icon
by Nibha Kumari, SAP Security Expert, Cintas Corporation | Gary Prewett, Security Practice Lead, NIMBL March 14, 2017
SAP Professional Journal/Financials/SCM – 

Segregation of duties (SoD) risks will not be detected by an out-of-the box SAP system rule set if your organization implements Master Data Governance (MDG).
Nibha Kumari and Gary PrewettIf show how to get a complete picture of SoD risks by modifying the rule set to detect cross-system risks associated with material, customer, and vendor master data maintenance in the MDG system.


Article icon
by Kehinde Eseyin, Security Architect February 24, 2017
SAP Professional Journal/Financials – 
Kehinde Eseyin describes the technical architectural design, setup, and implementation of SAP Fiori in the SAP GRC environment as it relates to SAP Access Control, SAP Risk Management, and SAP Process Control applications.

Article icon
by Neha Garg, Senior Developer, SAP Labs India Pvt. Ltd. January 12, 2017
SAP Professional Journal/Financials – 

Neha Garg explains what SAP Cloud Identity Access Governance is and what organizations can expect to gain from SAP Cloud Identity Access Governance and its newly released SAP Cloud Identity Access Governance, access analysis service in comparison with SAP Access Control.


Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. December 16, 2016
SAP Professional Journal/Financials/HR – 

Joshu Madina explains the process of identifying invalid mitigation assignments for user-level mitigations and role-level mitigations. He also provides you with details regarding extending the validity for expired mitigations and deleting invalid mitigation assignments.


Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how SAP Audit Management can help improve the audit execution and follow-up activities while enforcing process control and risk management.


Article icon
by Hernan Huwyler, Risk and Compliance Expert September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Juan Pablo Perez-Etchegoyen, CTO, Onapsis September 2, 2016
SAP Professional Journal/Financials – 
Juan Pablo Perez-Etchegoyen explains the details of the United States Computer Emergency Readiness Team (US-CERT) alert TA16-132A issued by the US Department of Homeland Security (DHS) and the vulnerability that triggered it. He also describes the mitigation steps that organizations using SAP systems need to follow to close the security gap potentially opened by this vulnerability.

Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how SAP Audit Management can help improve the different facets of the internal audit life cycle including audit planning and preparation while enforcing process control and risk management.


Article icon
by Kehinde Eseyin, Security Architect July 11, 2016
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how to configure SAP Audit Management to harness the benefits of risk-based auditing while integrating the system with SAP Process Control and SAP Risk Management.


Video icon
Financials/SAP Professional Journal – 

Many companies use solutions like SAP Access Control to analyze user access before roles are assigned and then report suspect activity to business owners. In this video, you'll see how leading companies are moving from reporting on these “potential” segregation of duties (SoD) violations to calculating their actual financial exposure by leveraging SAP Access Violation Management.

 


Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin explains how to configure an SAP Enterprise Threat Detection (SAP ETD) system and set up the SAP NetWeaver ABAP system as a log provider for enhanced log mining, threat detection, improved system security, and forensic investigation.


Article icon
by Rakesh Kalahasthi, Project Manager, PwC SDC, Bangalore, India March 8, 2016
SAP Professional Journal/BI – 

Rakesh Kalahasthi walks you through a step-by-step approach to overcome a limitation when you are developing geographical charts in SAP Lumira by pulling data from SAP Business Warehouse (SAP BW) powered by SAP HANA. SAP Lumira doesn’t allow you to create geographical charts by directly accessing SAP BW data models. This drawback can be addressed by importing optimized InfoCubes as native SAP HANA models and accessing them in SAP Lumira, which provides the ability to develop all types of geographical charts.


Article icon
by Nitin Aggarwal , Chartered Accountant and Certified Information Systems Auditor, Infosys | Sanjeev Kotwal, ABAP Technical Consultant, Infosys March 3, 2016
SAP Professional Journal/HR – 

Nitin Aggarwal and Sanjeev Kotwal show how to use the training verification functionality in SAP Access Control to automate the training check in the user access provisioning process.


Article icon
by Vinay Gupta, Senior Software Engineer, SAP Labs India Pvt. Ltd. February 8, 2016
SAP Professional Journal/Financials – 

Vinay Gupta explains how to certify roles and different attributes in role certification. He also provides you with details regarding role certification jobs.


Page 1 of 18         1 2 3 4 5 6 7 8 9 10