Governance

[122 Matches Found]
Page 1 of 7         1 2 3 4 5 6 7      
Video icon
by Alex Joseph, SAP GRC Practice Manager, itelligence Group November 13, 2014
SAP Professional Journal – 

In this webinar, Alex Joseph of itelligence explains how to get your SAP system clean, how to keep it clean, and how to maintain control of your SAP system with SAP Access Control.

 


Article icon
by Kavitha Nareshetty, SAP GRC Security Senior Consultant (Lead), Capgemini May 22, 2014
SAP Professional Journal – 
SAP Professional Journal – Kavitha Nareshetty explains how you can configure SAP Access Control to allow manual provisioning of non-SAP applications

Quick tips icon
by Meta Hoetjes, SAP Security Expert, CSI-tools December 31, 2013
SAP Professional Journal/Financials – 
Meta Hoetjes defines what access governance is and explains why it is so important for organizations to use good supporting tools for implementing access governance in organizations using SAP systems.

Article icon
by Kehinde Eseyin, Security Architect December 18, 2013
BI/Financials/SAP Professional Journal – 

Kehinde Eseyin explains how to control the ability of end users to make changes to the user settings of their Web Dynpro-based application forms.

 


Video icon
by Tracy Levine, SAP Application Consultant, itelligence November 27, 2013
SAP Professional Journal/Financials – 
In this webinar, Tracy Levine, SAP GRC Consultant at itelligence, discusses strategies around surviving an SAP security audit and maintaining compliance objectives long term. Tracy shares her methodology around optimizing your SAP security landscape and utilizing SAP Access Control to prevent reintroduction from risk exposures by taking an audit approach to SAP security.

Article icon
by Gary Byrne, Managing Editor, Financials Expert and SCM Expert November 19, 2013
SAP Professional Journal/Financials – 

Rajeev Menon, of Wharfedale Technologies Inc., shares some of the knowledge he has gleaned about securing SAP systems, cloud computing, and disaster recovery design and implementation.


In Depth
SAP Professional Journal/Financials – 

In this SAPexperts In Depth report, Kehinde Eseyin, a senior SAP GRC consultant at Turnkey Consulting Ltd., explains the top strategies and best practices that you can adopt to gain insight into different control objectives as they relate to the audit of SAP Access Control 10.0.

 


Article icon
by Gary Byrne, Managing Editor, Financials Expert and SCM Expert October 1, 2013
SAP Professional Journal/Financials – 

In this Spotlight Q&A, Onapsis CEO Mariano Nunez responded to a few of my questions about securing SAP systems, mobile applications, and cloud services.


Video icon
by Bruce McCuaig, Director, Solution Marketing, Governance, Risk, and Compliance, SAP August 23, 2013
SAP Professional Journal/Financials – 

In this video recording of a session from GRC 2013, you’ll learn about the new landscape of corporate governance and enterprise risk management shaped by the causes and effects of the recent global economic crisis. Learn how to:

  • Create an enterprise risk management strategy that encompasses a broad set of ever-changing risks that affect an organization's strategic business objectives
  • Identify and address possible events and situations that may affect your company's ability to optimize performance and achieve organizational goals
  • Establish a top-down approach to integrated risk management based on how forward-thinking companies are combining risk and strategy discussions in their board and executive management meetings

Article icon
by Dr. Susanne Rothaug, Solution Manager, SOA Middleware, SAP AG | Matthias Kaempfer, Solution Manager, SAP NetWeaver Foundation, SAP August 20, 2013
SAP Professional Journal/Financials – 

Follow these typical scenarios of an implementation of SAP NetWeaver Single Sign-On. They reflect the challenges that users face with authentication in heterogeneous environments and show how SAP NetWeaver Single Sign-On can help overcome them. You can use it in the most diverse environments, including on-premise, on-demand, and legacy applications.


Video icon
by Selva Kumar, Vice President, Auditbots July 30, 2013
SAP Professional Journal/Financials – 

SU24 is used to link an authorization object to a transaction. In this video Selva Kumar, vice president, AuditBots, shows you how you can also make the program check and uncheck the authorization object. This configuration is also used in SAP Access Control for identifying objects to be part of the SAP Access Control ruleset.


Video icon
by Selva Kumar, Vice President, Auditbots July 30, 2013
SAP Professional Journal/Financials – 

When you have a new custom transaction in your system, you need to perform a trace to identify the authorization object for which that particular transaction is looking. In this video, Selva Kumar, vice president, AuditBots, explains how this object can be used for updating transaction SU24 with proper authorization values for the custom transaction.


Video icon
by Selva Kumar, Vice President, Auditbots July 30, 2013
SAP Professional Journal/Financials – 

In this video Selva Kumar, vice president, AuditBots, explains how to update transaction ZFB50 in the SAP Access Control ruleset.


Video icon
by Sujana Somasekar, Development Architect, SAP Labs India July 29, 2013
SAP Professional Journal/Financials – 

— In this video Sujana Somasekar, development architect at SAP Labs India, walks you through a nine-step task-based approach to ensure your SAP Access Control segregation of duties (SoD) reports are accurate. 


Article icon
by Naeem Arif, SAP Consultant,Turnkey Consulting Ltd. July 17, 2013
SAP Professional Journal/Financials – 
I worked with a major North American utilities organization (referred to as ABC Ltd.) to complete a proof of concept to help it see the benefits of implementing SAP Process Control. I discuss this experience in this case study.


Article icon
by Hussain Ahmed, GRC and SAP Security and Authorizations Consultant, Tata Technologies Ltd. July 8, 2013
SAP Professional Journal/Financials – 

– In this case study, Hussain Ahmed explains how an automotive company used SAP Access Control checks to ensure that an SAP implementation has compliance built into every stage of the project life cycle — from conception to go-live and beyond.

 


Article icon
by Gary Byrne, Managing Editor, Financials Expert and SCM Expert June 28, 2013
SAP Professional Journal/Financials – 

Tracy Levine, an SAP application consultant at itelligence, fields some questions about various stages of preparing for an SAP security audit.


Video icon
by Susan Stapleton, Vice President of the Customer Advisory Office, Greenlight Technologies May 29, 2013
SAP Professional Journal/Financials – 
In this video, Susan Stapleton, vice president of the Customer Advisory Office at Greenlight Technologies, explains how to leverage various technological approaches to extend SAP GRC solutions across the enterprise.

Video icon
SAP Professional Journal/Financials – 

In this video Steve Biskie, managing director at High Water Advisors, discusses seven tips that show you how to use standard functionality in an SAP ERP system to identify security problems.


Article icon
by Doug TenBrock, Sr., Senior SAP QM Consultant, QMS Inc. May 29, 2013
SCM/SAP Professional Journal/Financials – 

Doug TenBrock Sr., senior SAP QM consultant, shows how SAP QM Audit Management can create a consistent process across an enterprise.


Page 1 of 7         1 2 3 4 5 6 7