Hier finden Sie alle Webinare, Leitfäden, Präsentationen und andere Insights von Turnkey an einer zentralen Stelle - kostenlos. Dies ist Ihre erste Anlaufstelle für GRC und Risikomanagement.
In this panel-style webinar in partnership with our strategic partner, SailPoint, we discussed how to manage Identity and Access in your SAP estate, helping you improve security, reduce risk and drive digital transformation.
In this 15-minute coffee break webinar, Turnkey's Cyber & Applications Practice Director, Tom Venables, explored the three biggest pitfalls in SAP S/4 HANA implementations - and how you can avoid them.
In this eBook, we take a detailed look into the security implications which come with both greenfield and brownfield deployment methods of SAP S/4 HANA, and the easily avoidable pitfalls which slow down the migration process for many users.
Risk management professionals are facing a greater number of threats than ever before. In this expert panel webinar, we were joined by risk management experts to discuss how you can broaden your IRM approach to cover all of today's and tomorrow's risks.
In this webinar, we were joined by Thomas Frénéhard, Global Finance and Risk CoE, at SAP, to explore how you can streamline your upgrade and take full advantage of GRC 12.0's added functionality after go-live.
Operational and enterprise risks present two very different types of threat to a business, and by managing them in separate silos, a consistent approach to risk management is not possible. In this guide, we'll highlight how to bridge the gap between these risks, and how to deploy a truly integrated approach to risk management.
You can’t control what you can’t see - and for many Telco companies operating with a traditional, siloed approach to risk management, considerable threats lie hidden and out of sight. In this guide we'll look at how Telecommunications companies can implement IRM in a phased and practical fashion.
The cyber threat landscape is rapidly evolving, and outdated security solutions will no longer cut it. This guide explores what Cyber Threat Intelligence is, and unpacks how it provides practical and efficient security which ensures your systems and data are secure.
Higher education institutions have to contend with many Identity & Access Management (IAM) challenges. In this eBook, we explore how the high volume of annual Joiners, Movers and Leavers means that IAM is consistently important for Higher Education institutions to consider.
The pharmaceutical industry is not immune to both the short and long term challenges which COVID-19 brings. This eBook is designed to help pharmaceutical companies evaluate their current risk management approaches, and consider what needs to be done to ensure that they thrive in these times of rapid change.
As a risk management company, we want to help those who have concerns about risk and security at this challenging time. So, at the start of lockdown, we launched a security and risk hub for COVID-19, which provides detailed, best practice advice to help you prepare and respond.
We recently surveyed over 100 senior SAP professionals to get their views on SAP security - more specifically, on their preparedness to implement security in their forthcoming S/4 HANA migrations.
The survey revealed several important findings that will provide invaluable insights for those about to embark on their S/4 HANA journey - or those already underway.
This very practical guide has been created to help SAP customers understand the new security considerations that come with implementing SAP S/4 HANA. We want you to side-step the mistakes of retrospective security work - so prevalent with past ERP projects. So, while there is still time to plan your migration, this guide will help you do so with security and compliance very much in mind.
Identity and Access Management (IAM) is a set of principles that, through the use of technology, ensures the right people, get the right access at the right time.
In this eBook we explore why this presents a risk to your organisation, in terms reduced productivity, financial losses, regulatory non-compliance and the threat of cyber attack - helping you build the case for SAP to be included in your next IAM project.
With Data Protection Day 2020 and Brexit both signifying landmark milestones for the GDPR, we wanted to revisit the regulation to see where SAP customers are in their journeys.
So, in our recent webinar we invited James Watson from SAP data specialist, EPI-USE Labs to share his experiences of working with SAP customers - and the best practices they have implemented to ensure compliance with the GDPR.
In the face of growing and evolving business risks, effective risk management is more essential than ever. It has become an almost mandatory part of global commerce (and indeed it is mandatory for UK businesses under the Companies Act 2006). Quite simply, if you’re not doing risk management properly, then your business is on shaky ground.
Underlying every SAP application is your SAP infrastructure - the silent and often-unseen support act that allows your application layer to run smoothly.
Today, this infrastructure is a complex web of operating systems, databases, network connections, servers and interfaces, all pushing and pulling data around your business. But while it’s critical to the seamless running of your organisation, it’s often overlooked from a security and risk perspective.
For IT leaders and those responsible for SAP applications, security has risen up the agenda. SAP environments are more complex than ever and increasingly vulnerable to external threats.
In this guest webinar, we are joined by Markus Schumacher, General Manager at Onapsis who explored the 5 main challenges CIOs and SAP security professionals face - along with his formula for success.
In this on-demand webinar, we look at how you can monitor and eliminate threats occurring within the SAP landscape using SAP Enterprise Threat Detection (ETD).
Turnkey’s own security expert, Tom Smith is joined by Paul Lloyd-Smith from SAP’s Office of the CFO to explore some simple use cases including alerting when an attacker creates a new user and managing alert investigations and exemptions.
As SAP landscapes become more and more open - with greater interconnectivity and increased remote access - the threat of external cyber attack on SAP systems increases exponentially.
Watch this on demand webinar to learn more about some of the tools and approaches you can use to minimise the risk.
In this 3-part series, we explore how organisations can reduce the risk of fraud using intelligent automation, how automating systems access greatly improves efficiency through the "joiner, mover leaver process" and how intelligent automation and monitoring can dramatically improve the management of high volume financial transactions.
This webinar will cover the following: the main takeaways from the keynote sessions, the latest customer success highlights, the key trends that emerge from the event, such as data privacy and cyber security, other news about SAP’s technology developments.
In this webinar, Richard Hunt, Managing Director of Turnkey, will examine some key ways you can use SAP to meet your GDPR obligations Among other issues, he’ll explore how to use SAP’s Process and Access Controls to control & monitor access to personal data & conduct Privacy Impact Assessments, use self-assessment for GDPR activities such as evaluating product compliance and more.
Focusing specifically on SAP BusinessObjects, the webinar will cover how to ensure careful control of access to personal data, setting up detection and alerts for any data breach, identifying specific data for flagging and removal, archiving, backup, restore and disaster recovery strategies and more.
Watch Patrick Boch from leading SAP Security solutions company, Virtual Forge explore common vulnerabilities which compromise an SAP system directly, the typical indirect attacks which open the doors to your SAP system landscape and easy strategies to keep attackers out.
This thought-provoking session explores some fundamental questions. How do we consider risk in our personal and business decisions? How do we use technology and can we do more with it? Do we have controls that we don't even think about? Ultimately, it all comes down to how we can run our business better. Watch the webinar to find out more.
In this practical guide, we lay out a step-by-step implementation approach for SAP GRC practitioners, who’ve been tasked with ensuring their organisation is ready for GDPR. The 9 steps have all been identified as key elements relating to GDPR in an SAP environment, which fall either wholly or partly within the remit of the IT department. They are all based on Turnkey’s extensive project experience in the field, as well as what we regard to be good practice.
With increased focus on the cloud and user experience, we'll also explore what this means to existing on-premise customers. In this webinar you will learn more about how to move forward with SAP GRC in a hybrid environment, SAP's continuing investments in on-premise SAP GRC, plans to improve the SAP GRC user experience and more.
In this webinar, by Turnkey Consulting’s Simon Persin you will learn about the main external threats targeted at SAP & ERP systems, security in a complex SAP HANA environment, getting more from your GRC systems and where to best focus your limited resources.
In this webinar, delivered by Turnkey Consulting’s Richard Hunt and Simon Persin you will get the latest updates from the conference including key insights from the speaker sessions, new SAP announcements of GRC products, customer success highlights and the general feeling of the conference.
In this webinar, by Turnkey Consulting’s Simon Persin you will learn about the trends from the speaker sessions, new announcements of products, customer highlights and the general feeling of the conference.
With the official launch of SAP GRC 12.0 (on-premise) in March 2018, Turnkey has been able to secure insights into the features and functions of this new release through our close relationships with the GRC Product and Solution Management teams within SAP, as well as being involved in the pre-release validation and testing.
Whilst the understanding of the capabilities of the new product is important, many customers are seeking to understand the impact of any changes and what the likely update, migration and implementation path might look like.