Commodity Risk Management

867 results

  1. Enhance User Access Risk Reporting in SAP Access Control 10.1 with User Master Data Attributes

    Learn how to enhance user risk analysis and user risk simulation analysis by leveraging a custom user group based on user master data (transaction code SU01) attributes. You will also learn how to improvise with custom variants (based on SU01 attributes) when defined custom user groups are not available for your business case or you…...…

  2. Dodd-Frank Act: Standardize Risk Management Processes with SAP BusinessObjects Risk Management 10.0

    Ensure that your enterprise’s risk management procedures comply with the Dodd-Frank Act’s requirements pertaining to the management of systemic risks by using SAP BusinessObjects Risk Management 10.0. It supports the five phases of risk management. Key Concept The Dodd-Frank Act was signed into law in July 2010 in response to the 2007 US financial crisis…....…

  3. A Guide to SAP’s Credit Risk Analyzer

    SAP’s Credit Risk Analyzer sub-module focuses on measuring, analyzing, and controlling counterparty risks. Learn how to use and configure it. Key Concept The Credit Risk Analyzer includes a risk control through limits and flexible limit management with online monitoring and reporting. This functionality allows corporate executives to set limit controls in their SAP systems, monitor…...…

  4. Increase the Success Rate of Your Strategies and Initiatives through an Enterprise Risk Management System

    Many risk managers complain about a lack of enterprise insight and alignment of risk management to the strategic objectives of their organization. With a rather manual and inconsistent approach based on emails and spreadsheets, they often fail to oversee the impact of risks to the strategic goals and whether appropriate risk responses were implemented to…...…

  5. Combine SAP Strategy Management and GRC Risk Management for Risk-Intelligent Strategic Execution

    Reading time: 22 mins

    In most organizations, strategic management and risk management are completely separate processes. As a result, it’s often difficult to track strategic goals over time while assessing the risks that might affect strategic initiatives. With an integrated approach to strategy and risk management, you can ensure that business owners are focusing on the right initiatives both…...…

  6. Perform Risk Analysis Using a Point-Based Scoring Method for Probability and Impact

    A risk is basically any event that can prevent executive management from meeting the defined business goals of an organization. Learn how to perform risk analysis using a simplified score-based concept that involves numeric-centric evaluation. Key Concept Risk management is the identification, analysis, and prioritization of risks followed by the optimal use of resources to…...…

  7. Harness Risk Threshold Definition to Drive Ad Hoc Risk Escalation

    Kehinde Eseyin shows how to configure, create, and process ad hoc risk escalations using SAP Risk Management 10.1. Key Concept Risk threshold is a reflection of the amount of risk an organization is ready to tolerate. Because risk threshold can be defined at the organizational unit level based on specific metrics, such as size, revenue,…...…

  8. Identify Your Key Business Risks in a Collaborative Process Involving All Stakeholders in Your Enterprise

    Learn about the second phase in the enterprise risk management (ERM) process, risk identification. The knowledge about your business risks is spread across your organization and lines of business. A collaborative approach is required to identify and document all risks threatening your enterprise involving many different stakeholders. Discover how SAP BusinessObjects Risk Management 3.0 provides…...…

  9. How to Prepare for a Comprehensive System Audit and Technical Review of SAP Access Control 10.0

    Learn invaluable tricks and tips for overcoming top auditing issues specific to an SAP Access Control 10.0 system. Key Concept A system audit is an exercise performed to gain assurance that defined controls work as intended, thereby eliminating the likelihood of fraudulent or malicious activities in the enterprise system. It involves the verification of conformance…...…

  10. Conduct a Workflow-Driven Risk Analysis Across Your Enterprise and Tune It to Your Business Needs

    Become acquainted with the third of the five-phase enterprise risk management (ERM) process: risk analysis. Step through the configuration to customize the risk analysis to your business needs. Learn how a risk analysis is initiated either directly by a responsible risk owner as a scheduled workflow task or by a key risk indicator (KRI) showing…...…