Key Insights Blog

Read the latest insights from our experts on GRC and risk management

14 May 2019

What a systems integrator may not explain about S/4 HANA security

With the clock ticking on the 2025 deadline, more and more SAP customers are preparing to move away ...
19 August 2016

How to Enable More Growth by Taking More Risk with More Control

In an era where change across all aspects of business is accelerating, the ability to adapt and grow...
21 January 2016

Least Privilege: Stand Up For Your Principles!

One of the most ubiquitous terms in information security, the principle of least privilege is used i...
6 August 2015

Do You Have Trust Issues?

Security is all about trust. Many organisations talk about trust in various ways, especially where s...
7 January 2015

Unlocking Management Information - Part 4

The final principle of secure and compliant data provisioning is: only present the reports to correc...
15 December 2014

Unlocking Management Information - Part 3

Up to now, we have looked at understanding the purpose of an MI system and some options for transfor...
29 August 2014

Unlocking Management Information - Part 2

In the previous installment, I described the need to clearly understand the purpose of a Business In...
18 August 2014

Security Engagement

When should security get involved in a project? The short answer to this is: as early in the project...
22 July 2012

Unlocking Information In BW

BW systems present some very specific challenges when authorising access to data, so for this series...