Kehinde Eseyin

Meet the Expert

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.

Explore all posts by Kehinde Eseyin

  • Seamlessly Activate and Deploy SAP Fiori 1.0 for SAP Solutions for GRC

  • Better Manage Enterprise Risk and Streamline Audit Lifecycle Management with SAP Audit Management (Part 2)

  • Better Manage Enterprise Risk and Streamline Audit Lifecycle Management with SAP Audit Management (Part 1)

  • Better Manage Enterprise Risk and Streamline Audit Life Cycle Management with SAP Audit Management (Part 1)

  • Drive Risk-Based Auditing in the SAP Audit Management System

  • How to Configure SAP Enterprise Threat Detection for Increased Surveillance and Real-Time Analysis of Security Threats

  • SAP Access Control Implementation: The Myth, Truth, and Tricks (Part 2)

  • SAP Access Control Implementation: The Myths, Truths, and Tricks (Part 2)

  • SAP Access Control Implementation: The Myths, Truths, and Tricks (Part 1)

  • Detect and Prevent Malicious Business Transactions with SAP Fraud Management

  • Prevent Data Disaster in Your SAP HANA System Landscape With Effective Backup and Restore Strategies

  • A Guide to Passing an SAP HANA System Security Audit

  • Technical Audit Scoping of an SAP HANA System: The Comprehensive Audit Questionnaire

  • Harness Risk Threshold Definition to Drive Ad Hoc Risk Escalation

  • How to Set Up SAP Supplier Lifecycle Management Business Scenario Capabilities

  • Enhance the Compliance Process and Regulatory Reporting in Your Organization with Disclosure Survey

  • Perform Risk Analysis Using a Point-Based Scoring Method for Probability and Impact

    Reading time: 16 mins

  • Get Your SAP System Landscape Technically Ready for SAP Assurance and Compliance

  • How to Simplify the Data Sources and Business Rules Logistics Process in SAP Process Control 10.1

  • Enhance User Access Risk Reporting in SAP Access Control 10.1 with User Master Data Attributes

  • 2 Ways to Control Making Changes to ABAP Web Dynpro Personalization Settings

  • How to Prepare for a Comprehensive System Audit and Technical Review of SAP Access Control 10.0

  • Take Advantage of the Support for Multiple Rulesets in SAP Access Control 10

  • How to Set Up and Implement User Defaults in SAP Access Control 10.0

  • Configure SLAs for Firefighter Audit Log Workflow Review

  • How to Use Workflow for Better Data Control and Integrity

  • Manage Multiple Compliance Initiatives Using the Multicompliance Framework in SAP Process Control 10.0

  • 3 Scenarios for Simulating Risk Analysis Processes with Risk Terminator

  • Easily Configure SAP NetWeaver Portal to Access the Work Center of SAP BusinessObjects GRC 10.0

    Reading time: 24 mins

  • Combat Access Risk Violations in Your SAP ABAP Back-End System with Risk Terminator

  • Tips and Tricks to Turbo-Charge Integrated Planning and Cost Object Controlling

  • Forestall Data Loss and Enforce Data Security with an Air-Tight Backup Policy

  • How to Use Data Management Techniques to Turbo-Charge SD Processes

  • Adopt Strategies to Conquer SAP HR Support Package Implementation Challenges

  • Follow a Reliable Project Management Framework for Your SAP Archiving Process

  • 5 Tips for Securing Communication Between SAP Systems and External Programs

  • Tips and Tricks for Archiving Your Purchasing Documents

  • How to Combat Performance Bottlenecks in Structural Authorization Checks

    Reading time: 9 mins

  • Simplify CRM Middleware Monitoring with the Central Monitoring Cockpit: Part 2

  • 10 Best Practices for Enforcing Data Security, Control, and Consistency in the Software Logistics Process

  • Eliminate Bottlenecks When You Access Data in the CRM WebClient UI

  • Optimize MM Performance with Data Management Best Practices

    Reading time: 14 mins

  • Simplify CRM Middleware Monitoring with the Central Monitoring Cockpit

  • Tackle Changes to Inventory, Cash Flow, and Benefit Regulations with SAP ERP

  • How SAP ERP Combats the Challenges of Global Accounting and Financial Reporting Standards

  • Gain Insight into the Foundations of Pricing in SAP CRM

  • Effective Data Management Strategies for Posting Payroll Results to Accounting

  • Prepare to Keep Your SAP Systems in Top Shape with Business Process Monitoring

  • Prevent a Data Disaster with Backup, Restore, and Recovery Strategies

  • Adopt Data Management Strategies to Optimize SAP CRM 7.0

  • Best Practices for Secure Programming in SAP NetWeaver

  • Build and Implement a Rock-Solid Compliance Framework for Your IFRS Conversion Project

  • Combat Chaos with a Lock-Down Security Policy in 12 Key Areas of Your SAP Environment