Governance, Risk, Compliance (GRC), and Cybersecurity
568 Blog Posts
116 Contributors
-
Today, cyber risk management is becoming increasingly important to financial planning and execution within an organization. In this video and in this article, I provide a comprehensive look at enterprise risk management and highlight the evolution... Read More »2Comments21Likes
-
Have you ever heard about the butterfly effect? Sometimes referred to as the ripple effect, it’s usually defined as the fact that a small change can have drastic consequences. The metaphor that gave its name to this concept is the idea that the... Read More »0Comments19Likes
-
In a previous blog, Harmonizing Different Risk Management Terminologies, I shared my conviction that companies should use a single shared terminology if they intend to bring down the walls that have siloed risk management practices by department... Read More »0Comments19Likes
-
In today’s hyper-connected network economy, cyber security is a top-of-mind boardroom discussion topic. Information is the new sinews of war. Your customer information, of course, but also your own financial and strategic plans, your employees’... Read More »0Comments19Likes
-
Wake up in the morning to the sound of crushing waves and with a progressively lightening-up room. Smell the freshly-ground coffee pouring into your cup via your programmable coffee machine. Scan your empty bottle of milk on your fridge to... Read More »0Comments19Likes
-
(Jana Subramanian is APJ Principal Cybersecurity Advisor for Cloud Security and Fellow of Information Privacy (FIP) awarded by International Association of Privacy Professional (IAPP). Jana supports strategic customer engagements on cybersecurity,... Read More »3Comments18Likes
-
Quite often we get contacted with the question – what does SAP offer as Consulting Services in the area of Cybersecurity & Compliance? Or what are the related services you can get within the support-contract from SAP? Where Do I Begin? Let me... Read More »1Comment18Likes
-
I’m not going to say that I have this question every Monday morning, but it does pop up rather more often than I would have expected. This is especially the case when risk, compliance or audit departments ask their IT counterparts to send them a... Read More »1Comment18Likes
-
(Jana Subramanian is APJ Principal Cybersecurity Advisor for Cloud Security and Fellow of Information Privacy (FIP) awarded by International Association of Privacy Professional (IAPP). Jana supports strategic customer engagements on... Read More »0Comments18Likes
-
One of the most important security requirements for public cloud is to ensure that misconfigurations in the landscape are avoided, and if not, quickly remediated. Misconfigurations can leave landscapes inadvertently exposed and vulnerable, without... Read More »2Comments18Likes