Risk Management

[148 Matches Found]
Page 1 of 8         1 2 3 4 5 6 7 8      
Article icon
by March 15, 2019
Financials – 
SAPinsider and SAP Experts assembled nine popular pieces to provide both strategic and tactical insights for organizations using SAP GRC solutions.

Video icon
by Alex Joseph, SAP GRC Practice Manager, itelligence Group November 13, 2014
SAP Professional Journal – 

In this webinar, Alex Joseph of itelligence explains how to get your SAP system clean, how to keep it clean, and how to maintain control of your SAP system with SAP Access Control.

 


Article icon
by Kavitha Nareshetty, SAP GRC Security Senior Consultant (Lead), Capgemini May 22, 2014
SAP Professional Journal – 
SAP Professional Journal – Kavitha Nareshetty explains how you can configure SAP Access Control to allow manual provisioning of non-SAP applications

Quick tips icon
by Meta Hoetjes, SAP Security Expert, CSI-tools December 31, 2013
SAP Professional Journal/Financials – 
Meta Hoetjes defines what access governance is and explains why it is so important for organizations to use good supporting tools for implementing access governance in organizations using SAP systems.

Article icon
by Kehinde Eseyin, Security Architect December 18, 2013
BI/Financials/SAP Professional Journal – 

Kehinde Eseyin explains how to control the ability of end users to make changes to the user settings of their Web Dynpro-based application forms.

 


Article icon
by Gary Byrne, Managing Editor, Financials Expert and SCM Expert November 19, 2013
SAP Professional Journal/Financials – 

Rajeev Menon, of Wharfedale Technologies Inc., shares some of the knowledge he has gleaned about securing SAP systems, cloud computing, and disaster recovery design and implementation.


Article icon
by Gary Byrne, Managing Editor, Financials Expert and SCM Expert October 1, 2013
SAP Professional Journal/Financials – 

In this Spotlight Q&A, Onapsis CEO Mariano Nunez responded to a few of my questions about securing SAP systems, mobile applications, and cloud services.


Video icon
by Bruce McCuaig, Director, Solution Marketing, Governance, Risk, and Compliance, SAP August 23, 2013
SAP Professional Journal/Financials – 

In this video recording of a session from GRC 2013, you’ll learn about the new landscape of corporate governance and enterprise risk management shaped by the causes and effects of the recent global economic crisis. Learn how to:

  • Create an enterprise risk management strategy that encompasses a broad set of ever-changing risks that affect an organization's strategic business objectives
  • Identify and address possible events and situations that may affect your company's ability to optimize performance and achieve organizational goals
  • Establish a top-down approach to integrated risk management based on how forward-thinking companies are combining risk and strategy discussions in their board and executive management meetings

Article icon
by Alpesh Parmar, Managing Partner, ultimumIT, Inc. August 19, 2013
HR/SAP Professional Journal/Financials – 

Learn steps to configure SAP Access Control 10.0 to integrate with SAP ERP HCM. Take advantage of the HR Trigger functionality in SAP Access Control 10.0 to automatically provision and de-provision access via HR event triggering.


Video icon
SAP Professional Journal/Financials – 
This video recording from Sandeep Poonen’s session at GRC 2013 provides tips, tricks, and lessons learned for extending the automated provisioning configured in SAP solutions for GRC to other applications, including your enterprise identity management solution. In the video Sandeep examines the following topics:

  • Compliance advantages that SAP solutions for GRC can bring to other applications
  • How to increase the visibility of your GRC program to the enterprise level
  • Key functions and capabilities that are available in SAP solutions for GRC that assist in integration with identity management solutions

Video icon
by Selva Kumar, Vice President, Auditbots July 30, 2013
SAP Professional Journal/Financials – 

SU24 is used to link an authorization object to a transaction. In this video Selva Kumar, vice president, AuditBots, shows you how you can also make the program check and uncheck the authorization object. This configuration is also used in SAP Access Control for identifying objects to be part of the SAP Access Control ruleset.


Video icon
by Selva Kumar, Vice President, Auditbots July 30, 2013
SAP Professional Journal/Financials – 

When you have a new custom transaction in your system, you need to perform a trace to identify the authorization object for which that particular transaction is looking. In this video, Selva Kumar, vice president, AuditBots, explains how this object can be used for updating transaction SU24 with proper authorization values for the custom transaction.


Video icon
by Selva Kumar, Vice President, Auditbots July 30, 2013
SAP Professional Journal/Financials – 

In this video Selva Kumar, vice president, AuditBots, explains how to update transaction ZFB50 in the SAP Access Control ruleset.


Article icon
by Naeem Arif, SAP Consultant,Turnkey Consulting Ltd. July 17, 2013
SAP Professional Journal/Financials – 
I worked with a major North American utilities organization (referred to as ABC Ltd.) to complete a proof of concept to help it see the benefits of implementing SAP Process Control. I discuss this experience in this case study.


Article icon
by Hussain Ahmed, GRC and SAP Security and Authorizations Consultant, Tata Technologies Ltd. July 8, 2013
SAP Professional Journal/Financials – 

– In this case study, Hussain Ahmed explains how an automotive company used SAP Access Control checks to ensure that an SAP implementation has compliance built into every stage of the project life cycle — from conception to go-live and beyond.

 


Article icon
by Kehinde Eseyin, Security Architect May 30, 2013
SAP Professional Journal/Financials – 
A typical organization needs to manage multiple rulesets for various reasons ranging from business process control structure to organizational structure make-up. SAP Access Control allows you to choose from more than one ruleset to perform risk analysis automatically. Learn how to use a business rule to influence the ruleset that is automatically applied to an access request based on defined attributes.

Video icon
by Susan Stapleton, Vice President of the Customer Advisory Office, Greenlight Technologies May 29, 2013
SAP Professional Journal/Financials – 
In this video, Susan Stapleton, vice president of the Customer Advisory Office at Greenlight Technologies, explains how to leverage various technological approaches to extend SAP GRC solutions across the enterprise.

Video icon
SAP Professional Journal/Financials – 

In this video Steve Biskie, managing director at High Water Advisors, discusses seven tips that show you how to use standard functionality in an SAP ERP system to identify security problems.


Quick tips icon
by Swetta Singh, Director of Solution Management, Governance, Risk and Compliance, SAP Labs | Chris Radkowski, Director of Solution Management, Governance, Risk and Compliance, SAP Labs | Keith Grayson, Business Development Manager, EMEA, SAP May 16, 2013
SAP Professional Journal/Financials – 
An integrated software solution that combines SAP NetWeaver Identity Management and SAP Access Control enables you to automate access governance and identity management capabilities to support automation of identity and access processes and compliance requirements. Use this table to compare the key features of SAP NetWeaver ID Management and SAP Access Control.

Article icon
by Swetta Singh, Director of Solution Management, Governance, Risk and Compliance, SAP Labs | Chris Radkowski, Director of Solution Management, Governance, Risk and Compliance, SAP Labs | Keith Grayson, Business Development Manager, EMEA, SAP May 16, 2013
SAP Professional Journal/Financials – 
Learn how to combine SAP NetWeaver Identity Management and SAP Access Control to automate access governance and identity management capabilities to support automation of identity and access processes and compliance requirements.

Page 1 of 8         1 2 3 4 5 6 7 8