
Strengthening the Core: GRC Integration for Enhanced Project Security
In March, our journey towards fortified security and compliance began with an article highlighting the critical importance of aligning efforts towards these essential goals. We outlined a five-step approach for better security and compliance, and this month we’re...

Building Trust in a Data Driven World: Responsibility and Accountability
Last month we outlined a five-step approach for better security and compliance. Â Now, we would like to take you on a journey, each month performing a deep dive into those five steps, to help you understand how to implement them in your own data access control...

Empowering Customers with GRC: A Step-by-Step Approach for SAP Security and Compliance
Gone are the days when a successful business can be risk averse. In today’s technology led world every layer of innovation and improvement adds another set of branches to the complex roadmap of governance, risk and compliance (GRC). But within that landscape often...

Navigating the Human Factor in InfoSec: A Holistic Approach to GRC and Risk Management
If you think technology can solve your security problems, then you don’t understand the problems, and you don’t understand the technology. This saying has been the mantra of the InfoSec community for decades, and as risk management, governance and compliance become...

SPRING AWAKENING & THE SCENT OF LILACS IN THE IT DEPARTMENT: 5 STEPS FOR DATA SECURITY IN AGILE PROCESSES
It took us a while to experience the awakening of spring not only in the calendar but also in nature. All the more reason for us to be happy about the “more lightness” …

SNAP-SHOT ANALYSIS: HOW ARE YOU HACKED?
With the SNAP-Shot analysis, you will find out after 72 hours where vulnerabilities are, what measures you should take against hacking and what effort is behind it. We create transparency with regard to compliance in SAP and you can measure yourself against the best in the benchmark.

AND WHEN WILL YOUR COMPANY BE HACKED?
The dramatic increase in cyber attacks last year puts the unpopular topic of “security” in the spotlight and shows that hackers combine technology and social engineering in equal measure. The question arises: How can we in the company protect our business suite from attacks?

MULTI-LAYER IT SECURITY CONCEPT: NECESSITY OR LUXURY?
Cyber attacks cause great economic damage around the globe. Protection against cyber attacks by securing and protecting the visible, technical infrastructure and through a consistently implemented internal control system. With this, you have the assignment of rights to roles and the associated data access to your business suite under control.

DATA, THE GOLD OF YOUR COMPANY: DO YOU KNOW WHAT YOUR BUSINESS PARTNERS ARE DOING WITH IT?
Data is the gold of digitization and represents the most valuable asset in companies. At the same time, protective walls are opened up to the outside world and external partners are granted access to the business suite.