Key Insights Blog

Read the latest insights from our experts on GRC and risk management.

How SAP GRC can accelerate integrated risk management (IRM)

by Cavan Arrowsmith on 11 October 2019

Many software vendors are shifting their positioning from GRC (Governance, Risk and Compliance) to IRM (Integrated Risk Management). But while IRM is a term heavily publicised and researched by ...

Avoiding security remediation in SAP S/4 HANA projects

by Cavan Arrowsmith on 20 September 2019

Given the significant investment and commitment required by an organisation to roll-out SAP S/4 HANA, the need to ensure the new environment is clean and secure from day one is paramount. That way ...

Why SAP access management should extend beyond the application layer

by Andrew Morris on 29 August 2019

With the vast majority of SAP user activity taking place at the application level, it stands to reason that security professionals should focus their access management efforts in this domain. Yet in ...

Managing today's SAP risks: the key questions

by Richard Hunt on 26 July 2019

SAP security and GRC professionals now have the tools and technology available to be more effective than ever in securing their critical SAP environments. Yet at the same time, the threat landscape ...

The security risks of increased mobility with SAP S/4 HANA

by Andrew Morris on 21 June 2019

The introduction of S/4 HANA is a major game-changer for SAP, as it offers a solution that’s designed to meet the challenges and requirements of the digital economy. And as 2025 marks the deadline to ...

How SAP ETD assists with cyber-security

Following on from the previous insight blog series from Turnkey and SAP on Brexit and SAP’s Global Trade Services (GTS) offering, we have collaborated with Paul Lloyd-Smith, Finance and Risk Solution ...

What a systems integrator may not explain about S/4 HANA security

by Tom Venables on 14 May 2019

With the clock ticking on the 2025 deadline, more and more SAP customers are preparing to move away from SAP ECC to S/4 HANA. And while six years to ‘upgrade’ to a new system might sound like a ...

How to create a risk management framework to deal with Brexit

by Simon Persin on 4 April 2019

After more than two years of Brexit negotiations, the terms of the UK’s impending EU departure still remain very much up in the air - and for businesses trying to plan for life outside the European ...

Google’s GDPR fine: a sharp reminder that non-compliance is not an option

by Sarah Nadwick on 13 March 2019

Previously, there has been significant focus on the fines being associated with unlawful disclosure of personal data. The current Google fine was much more concerned around the Privacy by Design ...

Managing SAP's automated access termination process

by Chris Harmour on 18 February 2019

Companies across the globe all face similar issues when it comes to effectively managing the termination of access to IT applications when an employee/contractor has the left the organisation. 

We would love to hear your thoughts. Please leave a comment.

We can let you know when we have a new blog - subscribe here

* We respect your privacy and personal data. By submitting your details and downloading our document you are accepting Turnkey Consulting's privacy policy which can be found here.


For a 3 minute Introduction to Turnkey Consulting, Download Our 18 Page Flipboard Guide