Search
Connecting SAP Access Control to Concur, Ariba, SuccessFactors and More
Connecting SAP Access Control to Concur, Ariba, SuccessFactors and More Can you manage Segregation of Duties (SoD), critical and sensitive access, and super-user access effectively and efficiently across the enterprise? Or do you have to deal with siloed systems that make it difficult to enforce governance? Do you need a unified, enterprise-wide approach to managing…
Talk like a Pirate Day? Let’s Talk Piracy: Cyber-Piracy, What is the True Cost?
Guest Blog: Brian Gonzalez Hernandez, SAP This Monday was the annual Talk-Like-a-Pirate-Day and while it is a celebration that I have always enjoyed, I thought today may be an important time to also speak on modern day piracy. When we think of Pirates, we often think of the likes of Blackbeard or the French Corsairs who were…
The Need for Banks to Manage Compliance More Effectively and Efficiently
While banks have always faced regulatory-driven change, the sheer volume of significant new regulation being introduced has become unmanageable for many. Looking ahead, conditions are set to remain challenging over a long period, especially considering the EU’s MiFID changes that are set to take effect on January 3rd, 2018. This may affect a wide range…
Implementing Controls for Exceptional / Super User Access
Implementing Controls for Exceptional/Super User Access It is not possible to eliminate all access policy conflicts where exceptional access needs to be granted to users to support business requirements. Emergency access enables a business or IT personnel to resolve problems in a timely manner within key business operating and transaction systems. When these situations occur,…
Understanding Access Risks
Understanding Access Risks Risk analysis is more than simply understanding who has access to what services. It’s also about what they are doing with their access. A proper analysis of access risk enables the organization to understand the risks and prioritize risk-resolution activities, because not all risks are equal. A detailed analysis of segregation of…
Monitoring and Mitigating Risks
It wouldn’t be unusual for a large organization to have hundreds of access-risk gaps that must be investigated and assessed and whose legitimacy must be confirmed. Inevitably, you will have a subset of individuals who must have access to a broad range of systems, processes, and transactions to perform key tasks that create SoD violations….
Pathlock Technologies and LTM Research Announce the Results of Their CISO Enterprise Cybersecurity Survey
Pathlock Technologies and LTM Research Announce the Results of Their CISO Enterprise Cybersecurity Survey Flemington, NJ (December 6, 2016) – Pathlock Technologies, a pioneering leader in security risk analytics and regulatory compliance solutions, announced the findings of a cybersecurity survey conducted by LTM Research that targeted 2,000 CISOs responsible for the security and management of…
The Top 5 Cybersecurity Breaches in 2016
The Top 5 Cybersecurity Breaches in 2016 The number of devastating cybersecurity breaches continues to rise and 2016 was no exception. It seems like every other day, the headlines pointed to another company or organization being breached. And we couldn’t escape a single report about the Presidential election without at least one mention of breached…
Moving to S/4HANA? Why You Need to Automate Controls to Truly Transform Finance
Moving to S/4HANA? Why You Need to Automate Controls to Truly Transform Finance S/4HANA is transforming finance by introducing reinvented processes and real-time insight for higher performance and better decision making. But what many organizations fail to realize is that their financial controls aren’t ready for S/4HANA. And if you’re making the move, you need…