Role- or ID-Based Firefighting: Which Option Is Best for Your SAP Systems Landscape?

  • by Kehinde Eseyin, Security Architect
  • September 28, 2012
In this webinar, Kehinde Eseyin, senior consultant at Turnkey Consulting (UK) Limited, discusses the options available for the implementation of Emergency Access Management. He explains two types of firefighting strategies: role and ID based.

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.


No comments have been submitted on this article. 

Please log in to post a comment.

To learn more about subscription access to premium content, click here.