Key Insights Blog

Read the latest insights from our experts on GRC and risk management

18 August 2020

What I have learnt from my recent SAP cybersecurity engagements

While a pre-implementation security acceptance test has been a common feature of any large system im...
14 August 2020

The Next-Gen SAP Systems Audit

In recent years, there has been a drastic change in the focus of SAP technology – transition to S/4 ...
4 August 2020

What is SAP Cyber Security, and why is managing SoD insufficient?

SAP technology has changed radically in recent years, and this has had a direct impact on SAP securi...
21 June 2018

SAP S/4 HANA security considerations

This article appeared in E-3 Magazine International on 19th June 2018.
23 October 2015

Access Control 5.3 End Of Life - Time To Upgrade, Or Do You Just Keep The Lights On?

Access Control 5.3 is due to exit “Mainstream Maintenance” and enter Extended Support at the end of ...
6 August 2015

Do You Have Trust Issues?

Security is all about trust. Many organisations talk about trust in various ways, especially where s...
14 February 2014

The Paradox Of Password Rules

Many organisations can expect to see some sort of findings on their audit reports pertaining to thei...
19 December 2013

Common Characteristics Of High Performing Teams

As we come to the end of 2013 I have been thinking of some of the projects that we have been working...
24 October 2013

SAP: The Increasing Cyber Security Threat

The cyber threat to IT systems in on the increase and this time it is not bored teenagers that we ne...
30 October 2012

Emergency Access Logs - What Is Logged And What Isn't?

The SAP GRC Emergency Access Management (EAM) log level has been the subject of a lot of questions a...