GRC

[343 Matches Found]
Page 1 of 18         1 2 3 4 5 6 7 8 9 10      
Article icon
Financials – 

Learn how the Merck Group (Merck KGaA, Darmstadt, Germany) integrated its global SAP landscape into its existing 24/7 Security Operations Center (SOC) monitoring and incident response processes. Learn how the company took 2 valuable teams, which traditionally operated in silos, and brought them together in a way that better protects against potential cyber attacks.


Article icon
Financials – 

Learn how McKesson implemented SAP Enterprise Threat Detection to strengthen its cybersecurity position. Walk through one of the first SAP Enterprise Threat Detection implementation in North America and find out how McKesson implemented automated attack detection patterns to keep an unwavering eye on potential threats.

 


Article icon
Financials – 

Learn how American Outdoor Brands successfully deployed SAP ERP and managed a dramatic surge in business and the acquisition of 3 companies within 3 years without any major controls or business disruptions. Understand how American Outdoor Brands balanced project resources and defined, implemented, and maintained a framework to manage change and financial controls.

 


Article icon
Financials – 

Learn how Stanley Black & Decker implemented SAP Access Control to manage and mitigate security risks, improve SoD reporting capabilities, and automate its security provisioning processes. Explore how the company integrated multiple SAP instances onto the application and defined a sustaining model for continued success of GRC initiatives.

 


Article icon
Financials – 

Revlon planned and executed a global SAP security redesign within just a few months. Learn how the company implemented a scalable segregation-of-duties-compliant role architecture in alignment with its GRC ruleset and business processes, and learn tips for managing different project streams efficiently.

 


Article icon
Financials – 

Newport News Shipbuilding has been running SAP ECC since the late 1990s in an environment with over 4,000 roles and 8,000 users. Learn how the firm leveraged SAP access risk analysis to review over 2,000 custom transactions across 6,000 programs created with 15 million lines of custom code to assess their impact on its control framework.


Article icon
Financials – 

Learn how Nemak went from an internal audit system relying on manual procedures to an automated process via SAP Process Control. See firsthand from Nemak how the company rolled out a self-assessment tool to monitor compliance across 24 legal entities worldwide and used continuous controls monitoring to streamline purchasing controls.


Article icon
Financials – 

Learn how Mars revamped its SAP security, minimized segregation of duties (SoD) risk, and increased efficiencies around access provisioning. Walk through the redesign of the company’s SAP landscape and the creation of task-based roles that are free of SoD risks and follow a standard naming convention.


Article icon
by Alka Paradkar , Johnson & Johnson | Neena Nash, Johnson & Johnson March 10, 2019
Financials – 

Learn how Johnson & Johnson deployed a global SAP Access Control blueprint for a highly decentralized environment. Examine challenges that were overcome and explore how the company replaced the traditional support model with a managed services model aimed at continuous process improvements to stabilize the access control program.


Article icon
Financials – 

Learn how Honeywell has driven standardization of controls and processes, improved efficiency, reduced costs, and increased organizational risk visibility using SAP Process Control and SAP Risk Management. Discover how the company developed a centralized “single source of truth” repository of risks, controls, policy, and survey data.


Article icon
SCM/Financials – 
Learn how Tremco minimized its international trade compliance risk using SAP Global Trade Services (SAP GTS). Discover how the company improved compliance levels and achieved greater supply chain visibility.

Article icon
Financials – 

Honeywell has implemented SAP GRC solutions for risk, compliance, and policy management across different business groups. Learn how the company developed powerful dashboards for the executive team that provide better insights about the health and effectiveness of the GRC program and how it is tied to business objectives.


Article icon
Financials – 

Examine how Eli Lilly and Company ensures the reliability and auditability of its process control system. Learn how it defines and deploys continuous control monitoring and the process flow it uses to identify issues.


Article icon
Financials – 
Learn how Tyson Foods maintains Sarbanes-Oxley (SOX) compliance by taking full advantage of its SAP governance, risk, and compliance (GRC) solutions to anticipate possible controls violations before they occur. See how the company proactively performs rigorous controls self-assessments using SAP Process Control.

Article icon
Financials – 
Mars transitioned its largest SAP user population to a new global security architecture and governance process. See how Mars completed the phases of the security redesign and learn about the key tasks it performed to ensure proper security role maintenance and user assignment.

Article icon
Financials – 

Learn how ConocoPhillips uses SAP Access Control tools to conduct periodic reviews, gather transaction usage statistics, and determine who is accessing its SAP systems. Find out how the company integrated the access control suite, access request management, and business role management functionality to make user access reviews fully operational in version 10.x.


Article icon
by Erin Swartzmiller, Stanley Black & Decker March 1, 2019
Financials – 
Learn how Stanley Black & Decker approached the design phase of its global SAP security redesign. Learn how Stanley Black & Decker implemented a process to create a standard global role structure that’s easy to manage, but flexible enough to be applied across multiple business processes, segments, and regions.

Article icon
Financials – 
Like many companies, Armstrong Flooring has been through many growth cycles, and its SAP security role environment was a conglomeration of poorly built old roles and properly built new roles. It faced challenges such as managing the roles, dealing with multiple naming conventions, understanding what users needed to do their jobs, and staying SOX compliant. Attend this session to learn how Armstrong Flooring undertook a full role rebuild, leveraging usage reports from SAP Access Control and implementing a task-based architecture.

Article icon
by Mahesh Ravinutula, Schlumberger | Troy Siewert, Schlumberger February 28, 2019
Financials – 
Schlumberger got security right from the beginning for its SAP implementation by defining it as an objective of the new deployment. Learn how the company reduced costs and risks while operationalizing the cybersecurity strategy for SAP applications and implementing security validation and monitoring processes.

Article icon
by Joshu Madina, Associate Architect, SAP Labs India Pvt. Ltd. December 29, 2017
SAP Professional Journal/Financials – 

Joshu Madina explains the process of Firefighter ID review request creation, assignment reviews, and removal of the Firefighter ID assignments from firefighters. He also provides you with details regarding setting up the workflows for the Firefighter ID reviews.


Page 1 of 18         1 2 3 4 5 6 7 8 9 10