Governance, Risk, Compliance (GRC), and Cybersecurity
501 Blog Posts
100 Contributors
-
Data Reliability for ESG-Reporting Companies are currently confronted with new reporting obligations and the associated compliance requirements based on regulatories as Corporate Sustainability Reporting Directive (CSRD) and EU Taxonomy. To generate... Read More »0Comments0Likes
-
Introduction In this blog post, we will learn how the “Self Service” Reveal type of Enhanced Reveal method works in SAP GUI. We will explore the configuration process by masking the “Social Security Number” of Employees in Infotype 2... Read More »0Comments0Likes
-
Cybersecurity automation and orchestration is an innovative approach to cybersecurity risk management that involves automating routine cybersecurity tasks and using orchestration to coordinate responses to cyber incidents. This approach can help... Read More »0Comments1Like
-
Why your organization should take care: Maintaining the security of installed SAP software is of critical strategic importance for the continuous protection of SAP business applications to defend against new types of cyber attacks and to close... Read More »0Comments5Likes
-
All global trends such as pandemic, trade wars, environmental initiatives, workplace shifts and the fast rising of cybersecurity, have impacted all processes and systems of the organization and are also absolutely valid for Governance, Risk,... Read More »0Comments1Like
-
On episode eleven of the Trust Podcast, an SAP podcast about cybersecurity, trust and today’s landscape, SAP’s Chief Trust Officer Elena Kvochko was joined by Dana Rao, EVP, General Counsel, Chief Trust Officer, at Adobe. They discussed how... Read More »1Comment0Likes
-
Introduction In this blog, as an example, we will be showing how a Long Text field can be protected in MM03, ME23N, and ME53N transactions. Purchase Order Text A Purchase Order Text is a text describing the material in more detail. This text is... Read More »4Comments1Like
-
Introduction In this blog, we will learn how to configure masking in Analytical Queries to protect the sensitive information displayed in it. Analytical Queries are used for reporting and analysis. S/4HANA Embedded Analytics Analytics is one of... Read More »0Comments1Like
-
Introduction In this blog, we will learn how to configure masking in Analytical Queries to protect the sensitive information displayed in it. Analytical Queries are used for reporting and analysis. S/4HANA Embedded Analytics Analytics is one of the... Read More »0Comments5Likes
-
Are you looking for the fastest path to growth and differentiation to support navigating these uncertain economic times or perhaps looking to reinvent your business model? Our customers have seen a significant increase in mergers, acquisitions... Read More »0Comments4Likes