Security

[96 Matches Found]
Page 1 of 5         1 2 3 4 5      
Article icon
Financials – 

Learn how the Merck Group (Merck KGaA, Darmstadt, Germany) integrated its global SAP landscape into its existing 24/7 Security Operations Center (SOC) monitoring and incident response processes. Learn how the company took 2 valuable teams, which traditionally operated in silos, and brought them together in a way that better protects against potential cyber attacks.


Article icon
Financials – 

Learn how American Outdoor Brands successfully deployed SAP ERP and managed a dramatic surge in business and the acquisition of 3 companies within 3 years without any major controls or business disruptions. Understand how American Outdoor Brands balanced project resources and defined, implemented, and maintained a framework to manage change and financial controls.

 


Article icon
Financials – 

Learn how Mars revamped its SAP security, minimized segregation of duties (SoD) risk, and increased efficiencies around access provisioning. Walk through the redesign of the company’s SAP landscape and the creation of task-based roles that are free of SoD risks and follow a standard naming convention.


Article icon
by J. Scott Hollands, Vivint | Patrick Kelliher, Vivint March 6, 2019
Financials/SCM – 

Take an in-depth look at how Vivint undertook its greenfield implementation of SAP S/4HANA (with regard to finance and the supply chain). Walk through the considerations Vivint took into account when implementing SAP S/4HANA, the project team assembled, and the focus on security, controls, and governance, risk, and compliance (GRC) as a part of the overall implementation program.


Article icon
Financials – 
Learn how Tyson Foods maintains Sarbanes-Oxley (SOX) compliance by taking full advantage of its SAP governance, risk, and compliance (GRC) solutions to anticipate possible controls violations before they occur. See how the company proactively performs rigorous controls self-assessments using SAP Process Control.

Article icon
Financials – 
Mars transitioned its largest SAP user population to a new global security architecture and governance process. See how Mars completed the phases of the security redesign and learn about the key tasks it performed to ensure proper security role maintenance and user assignment.

Article icon
by Erin Swartzmiller, Stanley Black & Decker March 1, 2019
Financials – 
Learn how Stanley Black & Decker approached the design phase of its global SAP security redesign. Learn how Stanley Black & Decker implemented a process to create a standard global role structure that’s easy to manage, but flexible enough to be applied across multiple business processes, segments, and regions.

Article icon
by Mahesh Ravinutula, Schlumberger | Troy Siewert, Schlumberger February 28, 2019
Financials – 
Schlumberger got security right from the beginning for its SAP implementation by defining it as an objective of the new deployment. Learn how the company reduced costs and risks while operationalizing the cybersecurity strategy for SAP applications and implementing security validation and monitoring processes.

Article icon
by Akash Kumar, Technical Consultant, SAP Labs September 15, 2017
SAP Professional Journal/HR/SCM/BI/Financials – 

Akash Kumar explains the concept of blockchain and explores the services released by SAP Cloud Platform Blockchain service that allow users to develop blockchain scenarios.


Quick tips icon
by Andrea Haynes, Group Editor, SAP Experts August 8, 2017
SAP Professional Journal/Financials/HR – 

Raymond Mastre, a director at PwC and a speaker at the GRC 2017 SAPinsider conference in Las Vegas, discusses SAP system security.



Article icon
by Hernan Huwyler, Risk and Compliance Expert September 21, 2016
Financials/HR/SAP Professional Journal/SCM – 
Hernan Huwyler provides you with practical guidance to plan for privacy controls in the SAP context to help you prepare your SAP system to comply with the General Data Protection Regulation (GDPR).

Article icon
by Juan Pablo Perez-Etchegoyen, CTO, Onapsis September 2, 2016
SAP Professional Journal/Financials – 
Juan Pablo Perez-Etchegoyen explains the details of the United States Computer Emergency Readiness Team (US-CERT) alert TA16-132A issued by the US Department of Homeland Security (DHS) and the vulnerability that triggered it. He also describes the mitigation steps that organizations using SAP systems need to follow to close the security gap potentially opened by this vulnerability.

Article icon
by Michael Kummer, President Americas, SECUDE May 2, 2016
SAP Professional Journal/Financials/HR – 
Every day users extract potentially business-critical information SAP applications for the purpose of reporting, analytics, and collaboration. Access to data stored inside SAP applications is strictly regulated by roles and authorizations. However, data that can be viewed can typically be downloaded from SAP applications. Michael Kummer explains that once the data has left the secure boundaries of the SAP system, it is at risk of being exposed to loss and theft. This is an often-overlooked gap that is complicated by the fact that SAP security teams have limited control over data outside the SAP environment.

Article icon
by Kehinde Eseyin, Security Architect December 14, 2015
SAP Professional Journal/Financials – 

Gain an understanding of supported and unsupported functionalities in the SAP Access Control system. Kehinde Eseyin shows how to configure the system correctly to achieve your defined business requirements.


Article icon
by Kehinde Eseyin, Security Architect November 16, 2015
Financials – 

Kehinde Eseyin shows how to configure SAP Fraud Management for easy detection, investigation, and prevention of fraudulent activities within your enterprise system using standard business contents.


Article icon
by Kehinde Eseyin, Security Architect July 20, 2015
SAP Professional Journal/Financials – 

Kehinde Eseyin provides concise descriptions of associated risks with security vulnerabilities in the SAP HANA landscape and offers recommendations to prevent the identified risks from materializing. The preventive measures he describes provide information about what auditors and auditees should be interested in when planning and performing a technical review of an SAP HANA database system.


Video icon
by Tom LaBonte, Senior Manager, Risk and Vulnerability Team, Honeywell Global Security June 29, 2015
Financials/SAP Professional Journal – 

Learn how Honeywell implemented and continues to use SAP Access Control 10.1.


Video icon
by Michael Kosonog, Partner Deloitte Consulting June 29, 2015
Financials/SAP Professional Journal – 

Walk through five required attributes to effectively track the SAP control optimization activities at your organization. Gather tips and tricks for applying the appropriate governance and organizational recommendations within your current control environment to increase adoption and sustainability of optimization efforts.


Video icon
Financials/SAP Professional Journal – 

In this video, walk through a maturity model that provides the core characteristics of top-performing organizations, including what separates them from bottom-performing organizations.


Video icon
by Gordon Roland, SAP Security, Controls, and GRC Solutions Senior Consultant, PwC August 14, 2014
Financials/SAP Professional Journal – 

Internal mistakes, fraud, and vendor inconsistencies all can wreak havoc on your accounts payable and purchasing activities. In this video Gordon Roland of PwC explains how to implement both standard ERP and SAP GRC functionality to solve these common problems within the purchase-to-payables process.


Page 1 of 5         1 2 3 4 5