Support  |  1-800-620-4210  |  
Home » Community » Blog
 

April
25
2022

Webinar April 28th : How to do Access Reviews for Non-SAP and Custom Objects by Gaurav Gautam

Why do you need periodic access reviews?  There is a myriad of…

March
21
2022

Webinar March 24th How to Secure SAP Against Fraud by Gaurav Gautam

How do you prevent losses from fraudulent activity?  There is always the…

March
12
2022

Webinar March 17th : SAP Fiori, Security Weaver, and You by Akash Jagga

Are you hesitating to move forward with SAP Fiori?  Lack of knowing…

January
24
2022

Webinar January 27th : Ask the Experts: Your SAP Role Redesign Questions Answered by Andy Hartley and Devin McLaughlin

What are best practices for designing SAP roles? A myriad of situations can…

October
17
2021

Webinar October 21st : 6 Examples of Tracking Relevant Risk Measures Over Time by Akash Jagga

How do you track risk in your SAP environment over time?  How…

August
8
2021

Webinar August 12th : Base, Trace, Replace: How to Lay the Foundation for an SAP Security Model

How do you ensure ongoing control of SAP and the right SAP security…

June
7
2021

Webinar June 10th : Can CCM Secure SAP Data and Applications?

How do you secure master data in SAP?  In large and small…

Page 1 of 2 pages  1 2 >