Risk Management

[173 Matches Found]
Page 1 of 9         1 2 3 4 5 6 7 8 9      
Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. February 24, 2017
SAP Professional Journal/Financials – 
Kehinde Eseyin describes the technical architectural design, setup, and implementation of SAP Fiori in the SAP GRC environment as it relates to SAP Access Control, SAP Risk Management, and SAP Process Control applications.

Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. December 16, 2016
SAP Professional Journal/Financials/HR – 

Joshu Madina explains the process of identifying invalid mitigation assignments for user-level mitigations and role-level mitigations. He also provides you with details regarding extending the validity for expired mitigations and deleting invalid mitigation assignments.


Article icon
by Juan Pablo Perez-Etchegoyen, CTO, Onapsis September 2, 2016
SAP Professional Journal/Financials – 
Juan Pablo Perez-Etchegoyen explains the details of the United States Computer Emergency Readiness Team (US-CERT) alert TA16-132A issued by the US Department of Homeland Security (DHS) and the vulnerability that triggered it. He also describes the mitigation steps that organizations using SAP systems need to follow to close the security gap potentially opened by this vulnerability.

Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. August 15, 2016
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how SAP Audit Management can help improve the different facets of the internal audit life cycle including audit planning and preparation while enforcing process control and risk management.


Article icon
by Anurag Barua, Independent SAP Advisor June 20, 2016
SAP Professional Journal/Financials – 

Anurag Barua explains how you can use the features of the Read Access Logging application to meet your organization’s needs for ensuring security of your sensitive data from an access perspective.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. April 14, 2016
SAP Professional Journal/Financials – 

Kehinde Eseyin explains how to configure an SAP Enterprise Threat Detection (SAP ETD) system and set up the SAP NetWeaver ABAP system as a log provider for enhanced log mining, threat detection, improved system security, and forensic investigation.


Article icon
by Rakesh Kalahasthi, Project Manager, PwC SDC, Bangalore, India March 8, 2016
SAP Professional Journal/BI – 

Rakesh Kalahasthi walks you through a step-by-step approach to overcome a limitation when you are developing geographical charts in SAP Lumira by pulling data from SAP Business Warehouse (SAP BW) powered by SAP HANA. SAP Lumira doesn’t allow you to create geographical charts by directly accessing SAP BW data models. This drawback can be addressed by importing optimized InfoCubes as native SAP HANA models and accessing them in SAP Lumira, which provides the ability to develop all types of geographical charts.


Article icon
by Vinay Gupta, Senior Software Engineer, SAP Labs India Pvt. Ltd. February 8, 2016
SAP Professional Journal/Financials – 

Vinay Gupta explains how to certify roles and different attributes in role certification. He also provides you with details regarding role certification jobs.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. January 4, 2016
SAP Professional Journal/Financials – 

In part 2 of his series, Kehinde Eseyin corrects assumptions about the SAP Access Control system that are not necessarily true and provides guidance on how to meet specific complex business requirements during an implementation project, including maintenance and support activities.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. December 14, 2015
SAP Professional Journal/Financials – 

Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. Kehinde Eseyin shows how to configure the system correctly to achieve your defined business requirements.


Article icon
by Sonia Sohal, Senior Developer for SAP Access Control, SAP Labs India Pvt. Ltd. September 9, 2015
SAP Professional Journal/HR/Financials – 

Sonia Sohal walks you through the steps to create an organization rule in SAP Access Control. She also explains the benefits of the Organization Rule Creation Wizard over the traditional approach of maintaining organization rules manually.


Video icon
by James Roeske, Co-Founder and Chief Executive Officer, Customer Advisory Group June 29, 2015
Financials/SAP Professional Journal – 

Gain detailed insight into the technical aspect of SAP Access Control, as well as an overview of realistic compliance scenarios.


Video icon
by Chris Radkowski, Director of Solution Management, Governance, Risk and Compliance, SAP Labs | Bert Laws, Senior Director, Business Analytic Solutions, SAP Labs LLC June 29, 2015
Financials/SAP Professional Journal – 

Learn about the newest capabilities of SAP Access Control in the cloud.


Video icon
by Tom LaBonte, Senior Manager, Risk and Vulnerability Team, Honeywell Global Security June 29, 2015
Financials/SAP Professional Journal – 

Learn how Honeywell implemented and continues to use SAP Access Control 10.1.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. November 19, 2014
SAP Professional Journal – 
Kehinde Eseyin shows how to configure, create, and process ad hoc risk escalations using SAP Risk Management 10.1.

Article icon
by Gary Prewett, Security Practice Lead, NIMBL July 31, 2014
SAP Professional Journal/Financials – 

Gary Prewett explains how to configure SAP Access Control and SAP Business Planning and Consolidation (BPC) to detect cross-system risk.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. June 12, 2014
SAP Professional Journal – 
Kehinde Eseyin explains the basic configuration activities required to use a risk-scoring analysis method productively in an SAP Risk Management system.

Article icon
by Gary Byrne, Managing Editor, Financials Expert and SCM Expert May 16, 2014
SAP Professional Journal – 

Juan Pablo Perez-Etchegoyen, chief technology officer at Onapsis, answers a few questions about Heartbleed’s threat to SAP systems and what measures you should take to protect your SAP environment.


Article icon
by Kehinde Eseyin, Senior SAP GRC Consultant, Turnkey Consulting Ltd. March 12, 2014
SAP Professional Journal – 

Kehinde Eseyin shows how to enhance user risk analysis and user risk simulation analysis by leveraging a custom user group based on user master data (transaction code SU01) attributes. 


Quick tips icon
by Meta Hoetjes, SAP Security Expert, CSI-tools December 31, 2013
SAP Professional Journal/Financials – 
Meta Hoetjes defines what access governance is and explains why it is so important for organizations to use good supporting tools for implementing access governance in organizations using SAP systems.

Page 1 of 9         1 2 3 4 5 6 7 8 9