Governance, Risk & Compliance

Increased regulation, and significant technology and business transformation holds ramification for GRC teams and strategy. Content in this category targets risk, audit, and compliance leaders and their teams. We will explore best practices from process perspective, but also delve into how organizations are using both SAP and third-party solutions to manage risk, user access, security, data protection and privacy and support their overall controls environment. Explore best practices, and case studies that will help your organization improve their current compliance initiative, apply leading edge technology, and get greater visibility into the key risks and vulnerabilities that impact your organization.


  1. GRC for SAP S/4HANA and Cloud Applications Research Report

    Reading time: 1 mins

  2. Managing the Identity Life Cycle in Hybrid SAP Environments

    Managing the Identity Life Cycle in Hybrid SAP Environments

    Reading time: 13 mins

  3. firefighter

    Brighthouse Financial Accelerates User Provisioning Cycles

    Reading time: 4 mins


  1. Xiting

    Reading time: 4 mins

    Before integrating Saviynt’s Identity Governance and Administration (IGA) solution and SAP Access Control, Brighthouse Financial ran an entirely manual user provisioning process using an access request feature in SharePoint. This case study explains how the Fortune 500 company improved their user provisioning processes for SAP products with SAP Access Control and then implemented Saviynt’s IGA…
  2. Video Q&A: Schaeffler Group’s Robin Mager offers his thoughts on RISE with SAP

    In this short video, Schaeffler’s Robin Mager discusses how sustainability and mobility disruption are changing the way the organization is offering its services to automotive and other industries.
  3. RSM corporate logo image


    RSM’s purpose is to deliver the power of being understood to our clients through world-class audit, tax and consulting services. The clients we serve are the engine of global commerce and economic growth, and we are focused on developing services to meet their evolving needs. As an Extended SAP Business Partner, with deep national and local resources, our in-depth SAP security risk and controls knowledge and experience brings to the table what your organization may lack internally. Whether it’s for an SAP implementation or an annual controls review, we can identify and assess key controls, using the most efficient and effective testing approach.

  4. Video Q&A: Brian Tremblay Discusses Compliance and Risk Strategies Everyone Should Know

    Brian Tremblay, Compliance Practice Leader at Onapsis, discusses with SAPinsider the importance of a holistic view toward compliance while sharing best practices for organizations to implement proactive, rather than reactive, compliance plans.
  5. Qlik

    Qlik’s vision is a data-literate world, where everyone can use data and analytics to improve decision-making and solve their most challenging problems. Qlik provides an end-to-end, real-time data integration and analytics cloud platform to close the gaps between data, insights and action. By transforming data into Active Intelligence, businesses can drive better decisions, improve revenue and profitability, and optimize customer relationships. Qlik does business in more than 100 countries and serves over 50,000 customers around the world.

  6. Case Study: ConocoPhillips Conducts User Access Reviews and Monitors Usage in SAP GRC Access Control

    Learn how ConocoPhillips uses SAP Access Control tools to conduct periodic reviews, gather transaction usage statistics, and determine who is accessing its SAP systems. Come away with user access review (UAR) best practices and key configuration steps and learn how to obtain valuable transaction usage data from your SAP systems. Attendees will: - Find out…
  7. Case Study: Eli Lilly and Company’s Tips for Troubleshooting SAP Process Control and Using CCMs

    Attend this session to understand how Eli Lilly and Company is using SAP Process Control Continuous Control Monitoring (CCM) to monitor compliance, automate control performance and check for system issues. During this session you will: - Gain insight into tips and tricks learned through real-word experience - Understand how Lilly is using CCM to automate…
  8. Q&A: How Protiviti’s Identropy Acquisition Meets Growing Identity and Access Management Demands

    Reading time: 5 mins

    by Annie Kennedy, SAPinsider In the past year, a global shift to remote working and transformations to digital environments have amplified business’ need for more efficient and secure access governance. SAPinsider spoke with management and technology consulting firm Protiviti about how their recent acquisition of Identropy, which specializes in identity and access management (IAM), can…
  9. Eli Lilly and Company Shares Key Technical Tips for Supporting SAP Process Control Effectively

    Now that you’re live on SAP Process Control, learn from Eli Lilly and Company about many of the key tables and reports that have helped the organization support its system effectively. This session provides a deeper dive into the technical details of Lilly’s use of SAP Process Control, with an emphasis on the technical support…