Governance, Risk, Compliance (GRC), and Cybersecurity
569 Blog Posts
116 Contributors
-
If you are engaging commercially with business partners (customers, 3rd parties, contractors…) then you might need to screen them to prevent trading with persons or organizations that are listed on a sanctioned party list. And that’s... Read More »0Comments3Likes
-
Introduction In this blog post, we will learn how to achieve Data-element based masking via an enhanced approach released as part of FP04 of UI Data Protection Masking for SAP S/4HANA. This new approach has removed the long pending demand from... Read More »2Comments1Like
-
Image: Source In an era of ever-evolving cyber threats and increasingly complex IT landscapes, traditional security models are struggling to keep pace. The Zero Trust Security model emerges as a transformative approach, challenging the conventional... Read More »0Comments2Likes
-
Following the success from the previous “What’s New” blog, I have once again asked their inputs from my colleagues from SAP GRC Product Management – Marie-Luise Wagener-Kirchner and Paul Petraschk, but also extended the invite to James Chiu... Read More »0Comments3Likes
-
We’re coming to the end of the summer vacation period. I hope you had a great time and had an opportunity to recharge. Cloud security didn’t stop, though, so here is a list of recent SAP cloud security articles published during this... Read More »0Comments3Likes
-
The Digital Personal Data Protection Act, 2023 (DPDP Act) marks a significant step forward on the ever-evolving landscape of data privacy and protection. While many countries have already implemented data protection laws, they vary from country to... Read More »0Comments3Likes
-
(Jana Subramanian serves as APJ Principal Cybersecurity Advisor for Cloud Security and a Fellow of Information Privacy (FIP), awarded by the International Association of Privacy Professionals (IAPP). In this role, Jana supports strategic customer... Read More »0Comments18Likes
-
Cybersecurity is a multi-dimensional problem that never ends. We dance between security risks, available budgets, talent shortages, and tooling. Cloud transformation only increases complexity by adding new technologies, greater developer... Read More »0Comments1Like
-
Problem Statement It’s a well-known fact that in the current economic, geopolitical, and digital transformation context, cyber security is being marked by every enterprise as a top priority. Nevertheless, it’s an increasingly complex and... Read More »0Comments6Likes
-
The SAP GRC Products pallet is designed to function as an integrated solution, but at times, its not a simple task to locate the right tool for a specific business process or function. Additionally, some enterprises may own applications licenses... Read More »1Comment2Likes