Governance, Risk & Compliance

Increased regulation, and significant technology and business transformation holds ramification for GRC teams and strategy. Content in this category targets risk, audit, and compliance leaders and their teams. We will explore best practices from process perspective, but also delve into how organizations are using both SAP and third-party solutions to manage risk, user access, security, data protection and privacy and support their overall controls environment. Explore best practices, and case studies that will help your organization improve their current compliance initiative, apply leading edge technology, and get greater visibility into the key risks and vulnerabilities that impact your organization.

Featured

  1. GRC for SAP S/4HANA and Cloud Applications Research Report

    Reading time: 1 mins

  2. Managing the Identity Life Cycle in Hybrid SAP Environments

    Managing the Identity Life Cycle in Hybrid SAP Environments

    Reading time: 13 mins

  3. firefighter

    Brighthouse Financial Accelerates User Provisioning Cycles

    Reading time: 4 mins

Results

  1. Thales

    Reading time: 4 mins

    Before integrating Saviynt’s Identity Governance and Administration (IGA) solution and SAP Access Control, Brighthouse Financial ran an entirely manual user provisioning process using an access request feature in SharePoint. This case study explains how the Fortune 500 company improved their user provisioning processes for SAP products with SAP Access Control and then implemented Saviynt’s IGA…
  2. How to Manage Enterprise Risk in Remote and Digital Environments

    Reading time: 12 mins

    As organizations migrate to SAP S/4HANA as part of their digital transformation effort, they should prioritize governance, risk, and compliance (GRC). The Institute of Internal Auditors (IIA) has developed a Three Lines Model to help with that journey. First-line roles include operation and support functions; second-line roles encompass corporate risk, compliance, and quality assurance functions;…
  3. How Identity and Access Management Technology Is Supporting People Power

    Reading time: 9 mins

    As more organizations operate in a remote work environment, effectively controlling access to corporate resources becomes imperative. Automated identity and access management (IAM) along with strategic human decision-making are critical to protecting resources and data. At the same time, IAM automation needs to be integrated into business policies and processes, advises James Roeske, CEO of…
  4. LS Headquarters image

    New Security Platform at Lundbeck Helps Ensure Business Continuity and Eliminate Risk of Fraud

    Reading time: 10 mins

    As one of the most highly regulated industries, the pharmaceutical industry takes an aggressive approach to supply chain risk management. Employing a global security system that supports access governance and authorization areas is critical in preventing fraud and maintaining business continuity. A case study on Lundbeck, a biopharmaceutical company based in Copenhagen, details how it…
  5. GRC: State of the Market Survey

    Reading time: 1 mins

    Benchmark your performance with your SAPinsider peers Join your peers and participate in the quick, 5-minute survey, Governance, Risk and Compliance: State of the Market, to be among the first to gain a complimentary copy of the benchmark report and see how your performance compares. The role of GRC leaders and their teams has become…
  6. Protecting the Applications Powering Your Business – SAP & Onapsis Working Together to Remediate and Mitigate Risk

    Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and…
  7. 2021 GRC Trends Affecting the Intelligent Enterprise

    Reading time: 5 mins

    The move to SAP S/4HANA holds broad implicates beyond technology simplicity, greater speed, and improved process improvement. Governance, Risk, and Compliance teams must fully understand the potential impact this transition has on security, roles, and overall risk to the organization. SAPinsider recently sat down with Dudley Alan Cartwright, CEO of Soterion, to hear how organizations…
  8. Securing the Intelligent Enterprise from Cyberattacks

    Join Onapsis and SAP as we highlight how to address security and compliance issues so you can protect your mission-critical applications. In this session we will discuss the latest threat landscape targeting SAP applications, the importance of keeping up with patches and the need to continuously assess and monitor SAP applications to quickly detect and…
  9. Xiting

    Xiting is a highly specialized SAP solution provider for Compliant Identity & Role Management. Xiting offers high-quality services in the area of SAP security and provides, as a consulting partner for companies of various sizes and in very different industries, a comprehensive service portfolio. With the specially-developed software solution Xiting Authorizations Management Suite (XAMS), the company has an unrivalled technology lead for SAP authorizations management according to SAP best practice.