Search
How to Extend Access Control for Managing Enterprise-Wide Access and Understand the Financial Exposure of Access Risks
How to Extend Access Control for Managing Enterprise-Wide Access and Understand the Financial Exposure of Access Risks Are you able to automate the linkage between regulatory compliance requirements, policies and standards with underlying controls? Can you easily uncover areas of non-compliance? Leading companies have found an innovation solution for quantifying financial exposure from SoD and…
Utilities Are Vulnerable to Cyberattacks
The sky turns black and thunder is heard in the distance. You see the first crack of lightning, a flicker, and then the power goes out. But what if the power outage wasn’t due to the storm… As the Prykarpattyaoblenergo Utility in the Ukraine found out, it could be due to a cyberattack. On December…
Guest Blog: Just Because Users “Can” Doesn’t Mean They “Do”
[retweet]by Sarah Wirk (@SAPGRCWirkS), Solutions Director – Governance, Risk, and Compliance Platform Solutions, Asia Pacific Japan, SAP Asia Pte Ltd. Risk for organisations is growing. With more devices to protect, more people who require access to data, and more partners to integrate with, the paradigm of access control is larger than ever. The Verizon Data…
CFO Perspective: Presenting Regulatory Compliance to Your Audit Committee
CFO Perspective: Presenting Regulatory Compliance to Your Audit Committee By Mark Kissman, CFO, Pathlock Technologies The Audit Committee plays a critical role in reviewing an organization’s strategy for achieving compliance with accounting regulations and standards and the resulting internal controls over financial reporting. However, they are increasingly getting involved in the oversight of risks related…
Quantify the Impact of Segregation of Duties on Your Business
From SAPInsider’s Special Report: Managing Risk, Security, and Compliance – Tips from Today’s GRC Leaders Companies are at varying stages of segregation of duties (SoD) management. Some still manually analyze risk with rudimentary methods, while others have moved to solutions such as SAP Access Control to automate their SoD analysis and implement preventive checks during…
Make Access Control Decisions Based on Business Impact
Make Access Control Decisions Based on Business Impact Managing the access that business users have to enterprise applications is a balancing act. Granting too much leaves organizations exposed to higher risk, but granting too little prevents people from doing their jobs and slows business momentum. Organizations need insight into the financial impacts of access risk…
7 Key Cybersecurity Mistakes Large Organizations Frequently Make
7 Key Cybersecurity Mistakes Large Organizations Frequently Make Relying solely on technology to combat today’s cyber threats, is no longer enough. it requires a holistic and evolving approach from the top down. Here are the 7 key cybersecurity mistakes large organizations frequently make. Implementing technology solutions that require constant updates Delays in updating cyber security…
Why SIEM Alone Isn’t Enough
Many organizations have deployed Security Information & Event Monitoring systems to enable them to detect and make sense of cybersecurity attacks either from external or internal sources across their networks, users and thousands of applications. SIEM looks for patterns which will help security teams identify technical issues, security breaches, and attacks more easily. But these…
CFO Perspective: Why CFOs Need to Stick Their Noses into Data Security
CFO Perspective: Why CFOs Need to Stick Their Noses into Data Security Cyber-theft of sensitive data continues to boom and affected organizations are scrambling to deal with the consequences. Wendy’s, Verizon Enterprise Solutions, UC Berkeley and even the IRS all fell victim to breaches that exposed personal records that were then sold on the dark…