Search Results

[42 Matches Found]
Page 1 of 3         1 2 3      
Article icon
by Kehinde Eseyin, Security Architect February 24, 2017
SAP Professional Journal/Financials – 
Kehinde Eseyin describes the technical architectural design, setup, and implementation of SAP Fiori in the SAP GRC environment as it relates to SAP Access Control, SAP Risk Management, and SAP Process Control applications.

Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how SAP Audit Management can help improve the audit execution and follow-up activities while enforcing process control and risk management.


Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how SAP Audit Management can help improve the different facets of the internal audit life cycle including audit planning and preparation while enforcing process control and risk management.


Article icon
by Kehinde Eseyin, Security Architect July 11, 2016
SAP Professional Journal/Financials – 

Kehinde Eseyin shows how to configure SAP Audit Management to harness the benefits of risk-based auditing while integrating the system with SAP Process Control and SAP Risk Management.


Article icon
SAP Professional Journal/Financials – 

Kehinde Eseyin explains how to configure an SAP Enterprise Threat Detection (SAP ETD) system and set up the SAP NetWeaver ABAP system as a log provider for enhanced log mining, threat detection, improved system security, and forensic investigation.


Article icon
by Kehinde Eseyin, Security Architect January 4, 2016
SAP Professional Journal/Financials – 

In part 2 of his series, Kehinde Eseyin corrects assumptions about the SAP Access Control system that are not necessarily true and provides guidance on how to meet specific complex business requirements during an implementation project, including maintenance and support activities.


Article icon
by Kehinde Eseyin, Security Architect December 14, 2015
SAP Professional Journal/Financials – 

Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. Kehinde Eseyin shows how to configure the system correctly to achieve your defined business requirements.


Article icon
by Kehinde Eseyin, Security Architect November 16, 2015
Financials – 

Kehinde Eseyin shows how to configure SAP Fraud Management for easy detection, investigation, and prevention of fraudulent activities within your enterprise system using standard business contents.


Article icon
by Kehinde Eseyin, Security Architect July 20, 2015
SAP Professional Journal/Financials – 

Kehinde Eseyin provides concise descriptions of associated risks with security vulnerabilities in the SAP HANA landscape and offers recommendations to prevent the identified risks from materializing. The preventive measures he describes provide information about what auditors and auditees should be interested in when planning and performing a technical review of an SAP HANA database system.


Article icon
Financials/SAP Professional Journal – 
Not having acute knowledge of the complexity of the SAP HANA system landscape is a recipe for under-planning and under-scoping an audit. Therefore, an audit questionnaire is invaluable for realistic audit scoping and consequently successful execution of the audit work. Kehinde Eseyin walks you through 30 questions that help you review your SAP HANA technical system.

Article icon
by Kehinde Eseyin, Security Architect December 18, 2013
BI/Financials/SAP Professional Journal – 

Kehinde Eseyin explains how to control the ability of end users to make changes to the user settings of their Web Dynpro-based application forms.

 


In Depth
SAP Professional Journal/Financials – 

In this SAPexperts In Depth report, Kehinde Eseyin, a senior SAP GRC consultant at Turnkey Consulting Ltd., explains the top strategies and best practices that you can adopt to gain insight into different control objectives as they relate to the audit of SAP Access Control 10.0.

 


Article icon
by Kehinde Eseyin, Security Architect May 30, 2013
SAP Professional Journal/Financials – 
A typical organization needs to manage multiple rulesets for various reasons ranging from business process control structure to organizational structure make-up. SAP Access Control allows you to choose from more than one ruleset to perform risk analysis automatically. Learn how to use a business rule to influence the ruleset that is automatically applied to an access request based on defined attributes.

Article icon
by Kehinde Eseyin, Security Architect April 9, 2013
SAP Professional Journal/Financials – 
Learn how to configure user defaults functionality in SAP Access Control 10.0 to drive automatic assignment of values to user master data based on specific request attributes.

Article icon
by Kehinde Eseyin, Security Architect March 29, 2013
SAP Professional Journal/Financials – 
It is important for organizations to act on requests when they are due, especially when working with a compliance tool such as SAP Access Control 10.0. See how to configure emergency access management service level agreements (SLAs) for the review of firefighter audit logs.

Quick tips icon
by Kehinde Eseyin, Security Architect January 31, 2013
SAP Professional Journal/Financials – 
Request mitigation policy is a business rule that you can use to drive the behavior of the approval process based on the attributes (risk level) of the risk identified during risk analysis for an access request. You can integrate this rule with the Mitigation Control Assignment Workflow for a more controlled access request management process.

Video icon
by Kehinde Eseyin, Security Architect September 28, 2012
SAP Professional Journal/Financials – 
In this webinar, Kehinde Eseyin, senior consultant at Turnkey Consulting (UK) Limited, discusses the options available for the implementation of Emergency Access Management. He explains two types of firefighting strategies: role and ID based.

Article icon
by Kehinde Eseyin, Security Architect August 9, 2012
SAP Professional Journal/Financials – 
Change request management is a control process aimed at ensuring that changes to master data are independently reviewed by appropriate personnel to ensure that the proposed modifications are not malicious and are in line with business needs and best practices. Learn how to configure the workflow-driven change request management functionality in SAP GRC 10.0 to maintain the integrity of your master data.

Article icon
SAP Professional Journal/Financials – 
Learn how SAP Process Control can help you arrange for different compliance initiatives to coexist within a central compliance management repository while harnessing existing master data.

Article icon
by Kehinde Eseyin, Security Architect April 18, 2012
SAP Professional Journal/Financials – 
Follow three scenarios that simulate risk analysis for role maintenance and user role provisioning with Risk Terminator in SAP BusinessObjects Access Control 10.0.

Page 1 of 3         1 2 3