Kehinde Eseyin

Meet the Expert

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.

Explore all posts by Kehinde Eseyin

  • Seamlessly Activate and Deploy SAP Fiori 1.0 for SAP Solutions for GRC

    Reading time: 17 mins

  • Better Manage Enterprise Risk and Streamline Audit Lifecycle Management with SAP Audit Management (Part 2)

    Reading time: 13 mins

  • Better Manage Enterprise Risk and Streamline Audit Lifecycle Management with SAP Audit Management (Part 1)

    Reading time: 17 mins

  • Better Manage Enterprise Risk and Streamline Audit Life Cycle Management with SAP Audit Management (Part 1)

    Reading time: 18 mins

  • Drive Risk-Based Auditing in the SAP Audit Management System

    Reading time: 33 mins

  • How to Configure SAP Enterprise Threat Detection for Increased Surveillance and Real-Time Analysis of Security Threats

    Reading time: 29 mins

  • SAP Access Control Implementation: The Myth, Truth, and Tricks (Part 2)

    Reading time: 20 mins

  • SAP Access Control Implementation: The Myths, Truths, and Tricks (Part 2)

    Reading time: 21 mins

  • SAP Access Control Implementation: The Myths, Truths, and Tricks (Part 1)

    Reading time: 22 mins

  • Detect and Prevent Malicious Business Transactions with SAP Fraud Management

    Reading time: 23 mins

  • Prevent Data Disaster in Your SAP HANA System Landscape With Effective Backup and Restore Strategies

    Reading time: 23 mins

  • A Guide to Passing an SAP HANA System Security Audit

    Reading time: 25 mins

  • Technical Audit Scoping of an SAP HANA System: The Comprehensive Audit Questionnaire

    Reading time: 19 mins

  • Harness Risk Threshold Definition to Drive Ad Hoc Risk Escalation

    Reading time: 17 mins

  • How to Set Up SAP Supplier Lifecycle Management Business Scenario Capabilities

    Reading time: 23 mins

  • Enhance the Compliance Process and Regulatory Reporting in Your Organization with Disclosure Survey

    Reading time: 17 mins

  • Perform Risk Analysis Using a Point-Based Scoring Method for Probability and Impact

    Reading time: 16 mins

  • Get Your SAP System Landscape Technically Ready for SAP Assurance and Compliance

    Reading time: 17 mins

  • How to Simplify the Data Sources and Business Rules Logistics Process in SAP Process Control 10.1

    Reading time: 14 mins

  • Enhance User Access Risk Reporting in SAP Access Control 10.1 with User Master Data Attributes

    Reading time: 9 mins

  • 2 Ways to Control Making Changes to ABAP Web Dynpro Personalization Settings

    Reading time: 6 mins

  • How to Prepare for a Comprehensive System Audit and Technical Review of SAP Access Control 10.0

    Reading time: 44 mins

  • Take Advantage of the Support for Multiple Rulesets in SAP Access Control 10

    Reading time: 11 mins

  • How to Set Up and Implement User Defaults in SAP Access Control 10.0

    Reading time: 14 mins

  • Configure SLAs for Firefighter Audit Log Workflow Review

    Reading time: 12 mins

  • How to Use Workflow for Better Data Control and Integrity

    Reading time: 14 mins

  • Manage Multiple Compliance Initiatives Using the Multicompliance Framework in SAP Process Control 10.0

    Reading time: 16 mins

  • 3 Scenarios for Simulating Risk Analysis Processes with Risk Terminator

    Reading time: 7 mins

  • Easily Configure SAP NetWeaver Portal to Access the Work Center of SAP BusinessObjects GRC 10.0

    Reading time: 24 mins

  • Combat Access Risk Violations in Your SAP ABAP Back-End System with Risk Terminator

    Reading time: 11 mins

  • Tips and Tricks to Turbo-Charge Integrated Planning and Cost Object Controlling

    Reading time: 11 mins

  • Forestall Data Loss and Enforce Data Security with an Air-Tight Backup Policy

    Reading time: 13 mins

  • How to Use Data Management Techniques to Turbo-Charge SD Processes

    Reading time: 12 mins

  • Adopt Strategies to Conquer SAP HR Support Package Implementation Challenges

    Reading time: 17 mins

  • Follow a Reliable Project Management Framework for Your SAP Archiving Process

    Reading time: 14 mins

  • 5 Tips for Securing Communication Between SAP Systems and External Programs

    Reading time: 13 mins

  • Tips and Tricks for Archiving Your Purchasing Documents

    Reading time: 9 mins

  • How to Combat Performance Bottlenecks in Structural Authorization Checks

    Reading time: 9 mins

  • Simplify CRM Middleware Monitoring with the Central Monitoring Cockpit: Part 2

    Reading time: 12 mins

  • 10 Best Practices for Enforcing Data Security, Control, and Consistency in the Software Logistics Process

    Reading time: 17 mins

  • Eliminate Bottlenecks When You Access Data in the CRM WebClient UI

    Reading time: 11 mins

  • Optimize MM Performance with Data Management Best Practices

    Reading time: 14 mins

  • Simplify CRM Middleware Monitoring with the Central Monitoring Cockpit

    Reading time: 15 mins

  • Tackle Changes to Inventory, Cash Flow, and Benefit Regulations with SAP ERP

    Reading time: 14 mins

  • How SAP ERP Combats the Challenges of Global Accounting and Financial Reporting Standards

    Reading time: 16 mins

  • Gain Insight into the Foundations of Pricing in SAP CRM

    Reading time: 12 mins

  • Effective Data Management Strategies for Posting Payroll Results to Accounting

    Reading time: 8 mins

  • Prepare to Keep Your SAP Systems in Top Shape with Business Process Monitoring

    Reading time: 10 mins

  • Prevent a Data Disaster with Backup, Restore, and Recovery Strategies

    Reading time: 12 mins

  • Adopt Data Management Strategies to Optimize SAP CRM 7.0

    Reading time: 14 mins

  • Best Practices for Secure Programming in SAP NetWeaver

    Reading time: 16 mins

  • Build and Implement a Rock-Solid Compliance Framework for Your IFRS Conversion Project

    Reading time: 24 mins

  • Combat Chaos with a Lock-Down Security Policy in 12 Key Areas of Your SAP Environment

    Reading time: 19 mins