Hier finden Sie alle Webinare, Leitfäden, Präsentationen und andere Insights von Turnkey an einer zentralen Stelle - kostenlos. Dies ist Ihre erste Anlaufstelle für GRC und Risikomanagement.
Many large and established organisations have struggled to transform their business models and operations to fully embrace the digital era. As a result, we’ve witnessed smaller, more agile disruptors leverage digital platforms to turn traditional markets upside down through the rapid delivery of digital products and services.
In the face of growing and evolving business risks, effective risk management is more essential than ever. It has become an almost mandatory part of global commerce (and indeed it is mandatory for UK businesses under the Companies Act 2006). Quite simply, if you’re not doing risk management properly, then your business is on shaky ground.
Underlying every SAP application is your SAP infrastructure - the silent and often-unseen support act that allows your application layer to run smoothly.
Today, this infrastructure is a complex web of operating systems, databases, network connections, servers and interfaces, all pushing and pulling data around your business. But while it’s critical to the seamless running of your organisation, it’s often overlooked from a security and risk perspective.
For IT leaders and those responsible for SAP applications, security has risen up the agenda. SAP environments are more complex than ever and increasingly vulnerable to external threats.
In this guest webinar, we are joined by Markus Schumacher, General Manager at Onapsis who explored the 5 main challenges CIOs and SAP security professionals face - along with his formula for success.
In this on-demand webinar, we look at how you can monitor and eliminate threats occurring within the SAP landscape using SAP Enterprise Threat Detection (ETD).
Turnkey’s own security expert, Tom Smith is joined by Paul Lloyd-Smith from SAP’s Office of the CFO to explore some simple use cases including alerting when an attacker creates a new user and managing alert investigations and exemptions.
As SAP landscapes become more and more open - with greater interconnectivity and increased remote access - the threat of external cyber attack on SAP systems increases exponentially.
Watch this on demand webinar to learn more about some of the tools and approaches you can use to minimise the risk.
In this 3-part series, we explore how organisations can reduce the risk of fraud using intelligent automation, how automating systems access greatly improves efficiency through the "joiner, mover leaver process" and how intelligent automation and monitoring can dramatically improve the management of high volume financial transactions.
This webinar will cover the following: the main takeaways from the keynote sessions, the latest customer success highlights, the key trends that emerge from the event, such as data privacy and cyber security, other news about SAP’s technology developments.
In this webinar, Richard Hunt, Managing Director of Turnkey, will examine some key ways you can use SAP to meet your GDPR obligations Among other issues, he’ll explore how to use SAP’s Process and Access Controls to control & monitor access to personal data & conduct Privacy Impact Assessments, use self-assessment for GDPR activities such as evaluating product compliance and more.
Focusing specifically on SAP BusinessObjects, the webinar will cover how to ensure careful control of access to personal data, setting up detection and alerts for any data breach, identifying specific data for flagging and removal, archiving, backup, restore and disaster recovery strategies and more.
Watch Patrick Boch from leading SAP Security solutions company, Virtual Forge explore common vulnerabilities which compromise an SAP system directly, the typical indirect attacks which open the doors to your SAP system landscape and easy strategies to keep attackers out.
This thought-provoking session explores some fundamental questions. How do we consider risk in our personal and business decisions? How do we use technology and can we do more with it? Do we have controls that we don't even think about? Ultimately, it all comes down to how we can run our business better. Watch the webinar to find out more.
In this practical guide, we lay out a step-by-step implementation approach for SAP GRC practitioners, who’ve been tasked with ensuring their organisation is ready for GDPR. The 9 steps have all been identified as key elements relating to GDPR in an SAP environment, which fall either wholly or partly within the remit of the IT department. They are all based on Turnkey’s extensive project experience in the field, as well as what we regard to be good practice.
With increased focus on the cloud and user experience, we'll also explore what this means to existing on-premise customers. In this webinar you will learn more about how to move forward with SAP GRC in a hybrid environment, SAP's continuing investments in on-premise SAP GRC, plans to improve the SAP GRC user experience and more.
In this webinar, by Turnkey Consulting’s Simon Persin you will learn about the main external threats targeted at SAP & ERP systems, security in a complex SAP HANA environment, getting more from your GRC systems and where to best focus your limited resources.
In this webinar, delivered by Turnkey Consulting’s Richard Hunt and Simon Persin you will get the latest updates from the conference including key insights from the speaker sessions, new SAP announcements of GRC products, customer success highlights and the general feeling of the conference.
In this webinar, by Turnkey Consulting’s Simon Persin you will learn about the trends from the speaker sessions, new announcements of products, customer highlights and the general feeling of the conference.
With the official launch of SAP GRC 12.0 (on-premise) in March 2018, Turnkey has been able to secure insights into the features and functions of this new release through our close relationships with the GRC Product and Solution Management teams within SAP, as well as being involved in the pre-release validation and testing.
Whilst the understanding of the capabilities of the new product is important, many customers are seeking to understand the impact of any changes and what the likely update, migration and implementation path might look like.