2023 Mastering SAP Melbourne Event Presentations
- HR & Payroll
- Data & Analytics
- Security & Risk
- Public Sector
- All Presentations
Discover the challenges of cloud transformation and security through SAP’s experience in navigating a rapidly growing multi-cloud landscape. Learn from their shared fate approach to overcome the multi-dimensional problem and focus on securing your own cloud journey.
In this presentation, James Mouat and Naomi Benjamin delve into the critical aspects of maintaining business objectives and elevating maturity in the context of deploying business solutions, particularly those involving People data. They examine the need for organizations to adapt and evolve their solutions in response to changing internal business requirements, evolving regulatory landscapes, and…
Linfox, aiming to be the most trusted logistics partner, recognized the need for improved SAP release management. To address risks related to manual processes, application silos, and lack of auditability, Linfox implemented ActiveControl, enabling rapid and reliable SAP change delivery while ensuring system integrity. This session highlights how Linfox maintains synchronized systems, enforces process governance,…
In this presentation, Tina, an experienced Compliance Consultant, shares valuable insights on navigating SAP audits and ensuring compliance with regulatory and audit requirements. Learn how to audit IT controls effectively, assess the alignment of your organization with SAP audit requirements, and establish policies and procedures to handle SAP audits. Tina’s expertise, gained from over 20…
Masterclass: DevSecOps, SecDevOps and Secure Cloud Transformation: Accountability Through Cloud Security EngineeringLearn how SAP incorporates a DevSecOps approach, focusing on security controls throughout the development cycle to secure their cloud services. Discover how they ensure compliance, detect and respond to incidents, and leverage data integration and enrichment for effective security operations. Gain actionable insights on how SAP “shifts left” and “shields right” to protect the cloud…
Becoming Cyber Resilient: Why Transforming SAP Security as part of your SAP S/4HANA Upgrade is VitalDiscover how Device Technologies transformed their SAP ECC 6.0 Security Model during their migration to SAP S/4HANA. By implementing an improved security design and governance framework, they effectively addressed risks such as excessive system access, misalignment with business processes, and segregation of duty concerns.
With the move to the cloud, managing multiple layers of responsibilities and trust relationships becomes crucial. This presentation explores how SAP handles these responsibilities through central controls, compliance tracking, and collaboration with cloud providers, ensuring security controls are in place and adhered to.
Discover the challenges and successes faced by Jabil during their migration to SAP S/4HANA and cloud adoption, including Access Control and Access Violation Management. Learn about their collaboration with the implementation team, leveraging a previous SAP S/4HANA installation, and upgrading GRC and the Access Violation Management tool for a successful upgrade.
Jabil’s journey with segregation of duties (SoD) control monitoring and automation has evolved over time to adapt to their growing landscape and compliance requirements. With the expansion of their global presence and diverse customer needs, role and access management across their manufacturing plants became a complex challenge. In 2015, they undertook a significant project to…
Your request has been successfully sent
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.