Meet the Expert

Kehinde Eseyin
Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.
Explore all posts by Kehinde Eseyin

Seamlessly Activate and Deploy SAP Fiori 1.0 for SAP Solutions for GRC
Reading time: 17 mins




Drive Risk-Based Auditing in the SAP Audit Management System
Reading time: 33 mins


SAP Access Control Implementation: The Myths, Truths, and Tricks (Part 2)
Reading time: 21 mins

SAP Access Control Implementation: The Myth, Truth, and Tricks (Part 2)
Reading time: 20 mins


Detect and Prevent Malicious Business Transactions with SAP Fraud Management
Reading time: 23 mins



Technical Audit Scoping of an SAP HANA System: The Comprehensive Audit Questionnaire
Reading time: 19 mins


How to Set Up SAP Supplier Lifecycle Management Business Scenario Capabilities
Reading time: 23 mins



Get Your SAP System Landscape Technically Ready for SAP Assurance and Compliance
Reading time: 17 mins





Take Advantage of the Support for Multiple Rulesets in SAP Access Control 10
Reading time: 11 mins







Combat Access Risk Violations in Your SAP ABAP Back-End System with Risk Terminator
Reading time: 11 mins

Tips and Tricks to Turbo-Charge Integrated Planning and Cost Object Controlling
Reading time: 11 mins








Simplify CRM Middleware Monitoring with the Central Monitoring Cockpit: Part 2
Reading time: 12 mins









Prepare to Keep Your SAP Systems in Top Shape with Business Process Monitoring
Reading time: 10 mins




Build and Implement a Rock-Solid Compliance Framework for Your IFRS Conversion Project
Reading time: 24 mins

Combat Chaos with a Lock-Down Security Policy in 12 Key Areas of Your SAP Environment
Reading time: 19 mins