Governance, Risk, Compliance (GRC), and Cybersecurity
505 Blog Posts
101 Contributors
-
For the first time, we’re co-locating our 2 Governance, Risk, and Compliance and Cybersecurity and Data Protection business focused events designed for the complete SAP GRC ecosystem: customers – of course, but also partners, and all... Read More »0Comments4Likes
-
Secure coding is the practice of writing code in a way that reduces the likelihood of introducing vulnerabilities or weaknesses that could be exploited by attackers. Secure coding is essential in the development of software and applications, as... Read More »0Comments0Likes
-
The energy and water sectors are two of the 16 critical infrastructure sectors the U.S. government labels as vital, noting that “their incapacitation or destruction would have a debilitating effect on security, national economic security, national... Read More »0Comments3Likes
-
Introduction In this blog post, we will learn how the “Self Service” Reveal type of Enhanced Reveal method works in SAPUI5 and Fiori application. We will explore the configuration process by masking the “City” field of Business Partner... Read More »0Comments1Like
-
Data Reliability for ESG-Reporting Companies are currently confronted with new reporting obligations and the associated compliance requirements based on regulatories as Corporate Sustainability Reporting Directive (CSRD) and EU Taxonomy. To generate... Read More »0Comments0Likes
-
Introduction In this blog post, we will learn how the “Self Service” Reveal type of Enhanced Reveal method works in SAP GUI. We will explore the configuration process by masking the “Social Security Number” of Employees in Infotype 2... Read More »0Comments0Likes
-
Cybersecurity automation and orchestration is an innovative approach to cybersecurity risk management that involves automating routine cybersecurity tasks and using orchestration to coordinate responses to cyber incidents. This approach can help... Read More »0Comments1Like
-
Why your organization should take care: Maintaining the security of installed SAP software is of critical strategic importance for the continuous protection of SAP business applications to defend against new types of cyber attacks and to close... Read More »0Comments5Likes
-
All global trends such as pandemic, trade wars, environmental initiatives, workplace shifts and the fast rising of cybersecurity, have impacted all processes and systems of the organization and are also absolutely valid for Governance, Risk,... Read More »0Comments1Like
-
On episode eleven of the Trust Podcast, an SAP podcast about cybersecurity, trust and today’s landscape, SAP’s Chief Trust Officer Elena Kvochko was joined by Dana Rao, EVP, General Counsel, Chief Trust Officer, at Adobe. They discussed how... Read More »3Comments0Likes