Governance, Risk, Compliance (GRC), and Cybersecurity
526 Blog Posts
105 Contributors
-
Vishal Verma – Head of Solution Management, Risk, Compliance and Tax, and Jochen Thierer – Head of Development for Governance, Risk & Compliance at SAP announced today plans to roll out a next generation Governance, Risk, and Compliance... Read More »12Comments21Likes
-
In this blog I will go through the steps to enable SAP Access Control 12.0 (on-premise) to use SAP Cloud Identity Access Governance as a bridge to facilitate creation of access requests, and performing risk analysis, for cloud applications. IAG... Read More »0Comments2Likes
-
In this blog I will go through the steps to Integrate IAG with SAP BTP Subaccount(Cloud foundry). This blog is not applicable for Neo Environment. The SAP Cloud Identity Access Governance solution offers multiple core services that help streamline... Read More »3Comments8Likes
-
I’ve written a couple of blogs on the topic of processes and controls already: one asking whether in GRC we miss the significance of the business processes because we focus a lot of attention on control compliance and control testing, and... Read More »0Comments2Likes
-
On this episode of the Trust Podcast, an SAP podcast about cybersecurity, trust and today’s landscape, SAP’s Chief Trust Officer Elena Kvochko was joined by Sandra Sucher, Professor of Management Practice at Harvard Business School and Author of... Read More »0Comments1Like
-
While the previous contemplation in our blog post series was focused on “How to audit the IT-related processes and controls on application-level”, we will focus on the infrastructure-level in the following. As the responsibility for the... Read More »0Comments2Likes
-
Governance, Risk, and Compliance (GRC) is more than just a set of policies and controls. It’s a strategic approach that helps organizations navigate the complex and ever-changing landscape of regulations and risks. With GRC, organizations can... Read More »0Comments0Likes
-
Purpose of the document: Creation and assignment of Mitigation Controls in SAP GRC 12.0.This document describes the Mitigation configuration proces in GRC12 Access Control in very simple and easy way. What is Mitigation? The Mitigation allows you... Read More »0Comments9Likes
-
Process Orchestration is Java based system and this can be integrated with GRC Access Control to use Access Request Management (ARM) functionality. Below is the step-by-step configuration required for the integration: Step 1 : Required Components in... Read More »2Comments6Likes
-
It has been over two years now since I released the first blog of the GRC Tuesdays series – Creating a Business Case for a Governance, Risk, and Compliance Solution and I have since received many requests for a more in depth post, with more... Read More »4Comments2Likes