Here you'll find all of Turnkey's webinars, guides, presentations and other insights available in one place - for free. It's your go-to resource for GRC and risk management.
On Thursday 1st July 2021, we hosted Beyond the Application: A Cyber Security Conference by Turnkey, where were joined by expert speakers from BP, SAP, Howdens and more.
The sessions focused on how those responsible for SAP security can look beyond the application, and proactively protect themselves from threats outside the SAP estate. All sessions were recorded, and available to watch on-demand.
In the past 12 months, cyber-attacks have become more common and more threatening, and that includes attacks on business-critical SAP applications. Nevertheless, many businesses don't have SAP Cyber Security in place as they think they don't have the resources, or that it's too complicated to implement.
This webinar reviewed the findings of our SAP Identity and Access Management Survey, which sought to establish the extent of this problem, and the impact it can have on the management of risk across the enterprise.
78% of SAP customers said they do not have full visibility of privileged accounts within their SAP estate - potentially leaving large parts of their infrastructure vulnerable to fraud or external attack.
In this report, we analyse the results of the SAP Privileged Access Management Survey and explore how SAP users can improve their Privileged Access Management so it is more robust and secure.
In this on-demand webinar, we explore the findings of our SAP Privileged Access Management Survey 2021, run in conjunction with CyberArk.
We also break down what the results will mean for IAM teams in the next 12 months - and how the management of privileged access can be improved across the SAP estate, and beyond.
In April 2021, we held a one-day virtual Integrated Risk Management Forum, with expert speakers from Siemens, SAP, ServiceNow and more.
In this eBook, we summarise the findings from that event, and outline how organisations can begin to prepare for the widely anticipated introduction of UK/EU SOX.
Earlier this year, we conducted a survey with more than 100 SAP customers worldwide, which explored views on the vulnerability of SAP systems to external threats and consequently revealed insights into several other elements of SAP security.
In this report, produced in conjunction with Onapsis, we summarise the findings of the survey, cover how complacency affects organisations' level of defence, and identify how SAP customers can protect themselves from external threats.
In this webinar, we provided an early look at the findings of our 2021 SAP Security Survey, run in conjunction with Onapsis. Specifically, our specialists covered why it's now vital that organisations look beyond roles and authorisations, and consider SAP security in the context of the wider cybersecurity landscape.
At this one-day virtual forum, we were joined by leading integrated risk management professionals from Siemens, SAP, and more.
You can now watch all the sessions on-demand, which explore how organisations can have a more agile, pragmatic, and integrated approach to risk, and effectively prepare for the emergence of UK/EU SOX.
In this panel-style webinar in partnership with our strategic partner, SailPoint, we discussed how to manage Identity and Access in your SAP estate, helping you improve security, reduce risk and drive digital transformation.
In this 15-minute coffee break webinar, Turnkey's Cyber & Applications Practice Director, Tom Venables, explored the three biggest pitfalls in SAP S/4 HANA implementations - and how you can avoid them.
In this eBook, we take a detailed look into the security implications which come with both greenfield and brownfield deployment methods of SAP S/4 HANA, and the easily avoidable pitfalls which slow down the migration process for many users.
Risk management professionals are facing a greater number of threats than ever before. In this expert panel webinar, we were joined by risk management experts to discuss how you can broaden your IRM approach to cover all of today's and tomorrow's risks.
In this webinar, we were joined by Thomas Frénéhard, Global Finance and Risk CoE, at SAP, to explore how you can streamline your upgrade and take full advantage of GRC 12.0's added functionality after go-live.
Operational and enterprise risks present two very different types of threat to a business, and by managing them in separate silos, a consistent approach to risk management is not possible. In this guide, we'll highlight how to bridge the gap between these risks, and how to deploy a truly integrated approach to risk management.
You can’t control what you can’t see - and for many Telco companies operating with a traditional, siloed approach to risk management, considerable threats lie hidden and out of sight. In this guide we'll look at how Telecommunications companies can implement IRM in a phased and practical fashion.
The cyber threat landscape is rapidly evolving, and outdated security solutions will no longer cut it. This guide explores what Cyber Threat Intelligence is, and unpacks how it provides practical and efficient security which ensures your systems and data are secure.
Higher education institutions have to contend with many Identity & Access Management (IAM) challenges. In this eBook, we explore how the high volume of annual Joiners, Movers and Leavers means that IAM is consistently important for Higher Education institutions to consider.
The pharmaceutical industry is not immune to both the short and long term challenges which COVID-19 brings. This eBook is designed to help pharmaceutical companies evaluate their current risk management approaches, and consider what needs to be done to ensure that they thrive in these times of rapid change.
As a risk management company, we want to help those who have concerns about risk and security at this challenging time. So, at the start of lockdown, we launched a security and risk hub for COVID-19, which provides detailed, best practice advice to help you prepare and respond.
We recently surveyed over 100 senior SAP professionals to get their views on SAP security - more specifically, on their preparedness to implement security in their forthcoming S/4 HANA migrations.
The survey revealed several important findings that will provide invaluable insights for those about to embark on their S/4 HANA journey - or those already underway.
This very practical guide has been created to help SAP customers understand the new security considerations that come with implementing SAP S/4 HANA. We want you to side-step the mistakes of retrospective security work - so prevalent with past ERP projects. So, while there is still time to plan your migration, this guide will help you do so with security and compliance very much in mind.
Identity and Access Management (IAM) is a set of principles that, through the use of technology, ensures the right people, get the right access at the right time.
In this eBook we explore why this presents a risk to your organisation, in terms reduced productivity, financial losses, regulatory non-compliance and the threat of cyber attack - helping you build the case for SAP to be included in your next IAM project.
With Data Protection Day 2020 and Brexit both signifying landmark milestones for the GDPR, we wanted to revisit the regulation to see where SAP customers are in their journeys.
So, in our recent webinar we invited James Watson from SAP data specialist, EPI-USE Labs to share his experiences of working with SAP customers - and the best practices they have implemented to ensure compliance with the GDPR.
Many SAP customers are looking to unify their approach to risk management under a Governance, Risk and Compliance (GRC) strategy - designed to manage risk across the organisation, ensure compliance and align IT with business strategy.
But how can organisations begin this transformation? And what are the essential SAP tools required to carry it out? Download the guide to find out.
In the face of growing and evolving business risks, effective risk management is more essential than ever. It has become an almost mandatory part of global commerce (and indeed it is mandatory for UK businesses under the Companies Act 2006). Quite simply, if you’re not doing risk management properly, then your business is on shaky ground.
Underlying every SAP application is your SAP infrastructure - the silent and often-unseen support act that allows your application layer to run smoothly.
Today, this infrastructure is a complex web of operating systems, databases, network connections, servers and interfaces, all pushing and pulling data around your business. But while it’s critical to the seamless running of your organisation, it’s often overlooked from a security and risk perspective.
For IT leaders and those responsible for SAP applications, security has risen up the agenda. SAP environments are more complex than ever and increasingly vulnerable to external threats.
In this guest webinar, we are joined by Markus Schumacher, General Manager at Onapsis who explored the 5 main challenges CIOs and SAP security professionals face - along with his formula for success.
In this on-demand webinar, we look at how you can monitor and eliminate threats occurring within the SAP landscape using SAP Enterprise Threat Detection (ETD).
Turnkey’s own security expert, Tom Smith is joined by Paul Lloyd-Smith from SAP’s Office of the CFO to explore some simple use cases including alerting when an attacker creates a new user and managing alert investigations and exemptions.
As SAP landscapes become more and more open - with greater interconnectivity and increased remote access - the threat of external cyber attack on SAP systems increases exponentially.
Watch this on demand webinar to learn more about some of the tools and approaches you can use to minimise the risk.
In this 3-part series, we explore how organisations can reduce the risk of fraud using intelligent automation, how automating systems access greatly improves efficiency through the "joiner, mover leaver process" and how intelligent automation and monitoring can dramatically improve the management of high volume financial transactions.
This webinar will cover the following: the main takeaways from the keynote sessions, the latest customer success highlights, the key trends that emerge from the event, such as data privacy and cyber security, other news about SAP’s technology developments.
In this webinar, Richard Hunt, Managing Director of Turnkey, will examine some key ways you can use SAP to meet your GDPR obligations Among other issues, he’ll explore how to use SAP’s Process and Access Controls to control & monitor access to personal data & conduct Privacy Impact Assessments, use self-assessment for GDPR activities such as evaluating product compliance and more.
Focusing specifically on SAP BusinessObjects, the webinar will cover how to ensure careful control of access to personal data, setting up detection and alerts for any data breach, identifying specific data for flagging and removal, archiving, backup, restore and disaster recovery strategies and more.
Watch Patrick Boch from leading SAP Security solutions company, Virtual Forge explore common vulnerabilities which compromise an SAP system directly, the typical indirect attacks which open the doors to your SAP system landscape and easy strategies to keep attackers out.
This thought-provoking session explores some fundamental questions. How do we consider risk in our personal and business decisions? How do we use technology and can we do more with it? Do we have controls that we don't even think about? Ultimately, it all comes down to how we can run our business better. Watch the webinar to find out more.