April252022
Webinar April 28th : How to do Access Reviews for Non-SAP and Custom Objects by Gaurav Gautam
Why do you need periodic access reviews? There is a myriad of…
April172022
Webinar April 21st : Ask the Experts: Your SAP Role Redesign Questions Answered Part 2 by Andy Hartley and Devin McLaughlin
How do you know it is time to redesign your SAP role catalog?…
March212022
Webinar March 24th How to Secure SAP Against Fraud by Gaurav Gautam
How do you prevent losses from fraudulent activity? There is always the…
March122022
Webinar March 17th : SAP Fiori, Security Weaver, and You by Akash Jagga
Are you hesitating to move forward with SAP Fiori? Lack of knowing…
October172021
Webinar October 21st : 6 Examples of Tracking Relevant Risk Measures Over Time by Akash Jagga
How do you track risk in your SAP environment over time? How…
August82021
Webinar August 12th : Base, Trace, Replace: How to Lay the Foundation for an SAP Security Model
How do you ensure ongoing control of SAP and the right SAP security…
June72021
Webinar June 10th : Can CCM Secure SAP Data and Applications?
How do you secure master data in SAP? In large and small…
October152014
3 ways a more efficient authorization incident process impacts end users
Following up on my last post about making life easier for an SAP…