Governance, Risk & Compliance

Increased regulation, and significant technology and business transformation holds ramification for GRC teams and strategy. Content in this category targets risk, audit, and compliance leaders and their teams. We will explore best practices from process perspective, but also delve into how organizations are using both SAP and third-party solutions to manage risk, user access, security, data protection and privacy and support their overall controls environment. Explore best practices, and case studies that will help your organization improve their current compliance initiative, apply leading edge technology, and get greater visibility into the key risks and vulnerabilities that impact your organization.

Featured

  1. GRC for SAP S/4HANA and Cloud Applications Research Report

    Reading time: 1 mins

  2. Managing the Identity Life Cycle in Hybrid SAP Environments

    Managing the Identity Life Cycle in Hybrid SAP Environments

    Reading time: 13 mins

  3. firefighter

    Brighthouse Financial Accelerates User Provisioning Cycles

    Reading time: 4 mins

Results

  1. Virtustream

    Reading time: 4 mins

    Before integrating Saviynt’s Identity Governance and Administration (IGA) solution and SAP Access Control, Brighthouse Financial ran an entirely manual user provisioning process using an access request feature in SharePoint. This case study explains how the Fortune 500 company improved their user provisioning processes for SAP products with SAP Access Control and then implemented Saviynt’s IGA…
  2. Enabling Digital Transformation with Continuous Controls Monitoring (CCM)

    This past year saw an unprecedented acceleration of digital transformation. Initiatives supporting cloud adoption, remote work, and business continuity quickly jumped to the top of every CIO and CISO’s agenda. Migrating to a modern ERP solution like SAP S4/HANA introduces a whole host of questions and changes, starting with how to secure the sensitive data…
  3. SAP S/4HANA fit for purpose? How a tax engine can improve VAT accuracy.

    The rapid changes taking place in today’s global business, technology, and regulatory environments are having a compounding effect on the complexity of indirect tax management. This includes authorities requiring businesses to file their VAT return in (near) real-time and with more granular data than ever before. In addition to this, with businesses entering new geographies…
  4. Icertis

    With unmatched technology and category-defining innovation, Icertis pushes the boundaries of what’s possible with contract lifecycle management (CLM). The AI-powered, analyst-validated Icertis Contract Intelligence (ICI) platform turns contracts from static documents into strategic advantage by structuring and connecting the critical contract information that defines how an organization runs. Today, the world’s most iconic brands and disruptive innovators trust Icertis to govern the rights and commitments in their 10 million+ contracts worth more than $1 trillion, in 40+ languages and 90+ countries.

  5. Consolidate Multiple SAP and Non-SAP Systems into One S/4HANA Implementation

    Navigating the journey to SAP S/4HANA but unsure how to retire old and costly applications without comprising the integrity of your data? Simplify the push towards digital transformation and cut desperate ties with aging legacy systems. Take a one-step approach and transform data from any SAP or non-SAP system onto a single unified platform. Leverage…...…
  6. Call for Papers image

    2022 Call for Papers: SAPinsider Conference

    We want to know if you’ve had an SAP technology journey experience that could help guide your peers facing similar challenges, or did you master a process or discover best practices around implanting a new product – then we enthusiastically encourage you to amplify your voice as an expert with SAPinsider! As an SAP professional,…
  7. SAP Security Redesigns image

    Companies Combine their SAP Security Redesigns

    Reading time: 4 mins

    A poorly executed SAP security redesign can have significant effects on an organization: unauthorized access, increased potential for fraud, inefficient access provisioning for end-users, and audit issues. To avoid this scenario and improve security, more companies are combining their SAP security redesigns with updates to their SAP GRC solutions, observes Adam Fattorini, Senior Manager, PwC…