Blogs
August82021
Webinar August 12th : Base, Trace, Replace: How to Lay the Foundation for an SAP Security Model
How do you ensure ongoing control of SAP and the right SAP security model? It can be hard to build the right SAP security…
August12021
Webinar August 05th : 5 Tips & Tricks for Automating SOD Conflict Mitigation by Asokkumar Christian and Ashish Sabharwal
How to efficiently handle all SoD risks in your SAP environment? Catching 100% of your SAP environment’s relevant SoD business transactions may seem…
July262021
Webinar July 29th : Five Ways to Mitigate Risks with Sensitive Access and SOD Conflicts by Diane Reinsma
How do you mitigate risks with sensitive access and SoD conflicts? Mitigating sensitive access risks within SAP does not require complicated, tedious, or time-consuming…
July22021
Webinar July 8th : Testing GRC… Is That Enough?
How do you validate your GRC Controls? Validating your SAP governance and controls platform is required before audits can be trusted. But, where do…
June282021
Will MCA’s new amendment drive up the cost of compliance for SAP users?
The short answer is yes. Earlier this year, the Ministry of Corporate Affairs, released an amendment requiring companies that use accounting software to provide…
June212021
Webinar June 24th : Keys to Improving Your SAP Role Designs
Are you naming your SAP Roles correctly? Which of your SAP roles support a particular business function? Which roles have sensitive access? If you…