Key Insights Blog

Read the latest insights from our experts on GRC and risk management.

Why SAP access management should extend beyond the application layer

by Andrew Morris on 29 August 2019

With the vast majority of SAP user activity taking place at the application level, it stands to reason that security professionals should focus their access management efforts in this domain. Yet in ...

Managing today's SAP risks: the key questions

by Richard Hunt on 26 July 2019

SAP security and GRC professionals now have the tools and technology available to be more effective than ever in securing their critical SAP environments. Yet at the same time, the threat landscape ...

The security risks of increased mobility with SAP S/4 HANA

by Andrew Morris on 21 June 2019

The introduction of S/4 HANA is a major game-changer for SAP, as it offers a solution that’s designed to meet the challenges and requirements of the digital economy. And as 2025 marks the deadline to ...

How SAP ETD assists with cyber-security

Following on from the previous insight blog series from Turnkey and SAP on Brexit and SAP’s Global Trade Services (GTS) offering, we have collaborated with Paul Lloyd-Smith, Finance and Risk Solution ...

What a systems integrator may not explain about S/4 HANA security

by Tom Venables on 14 May 2019

With the clock ticking on the 2025 deadline, more and more SAP customers are preparing to move away from SAP ECC to S/4 HANA. And while six years to ‘upgrade’ to a new system might sound like a ...

How to create a risk management framework to deal with Brexit

by Simon Persin on 4 April 2019

After more than two years of Brexit negotiations, the terms of the UK’s impending EU departure still remain very much up in the air - and for businesses trying to plan for life outside the European ...

Google’s GDPR fine: a sharp reminder that non-compliance is not an option

by Sarah Nadwick on 13 March 2019

Previously, there has been significant focus on the fines being associated with unlawful disclosure of personal data. The current Google fine was much more concerned around the Privacy by Design ...

Managing SAP's automated access termination process

by Chris Harmour on 18 February 2019

Companies across the globe all face similar issues when it comes to effectively managing the termination of access to IT applications when an employee/contractor has the left the organisation. 

Should you outsource your risk and compliance activities?

by Simon Persin on 16 January 2019

It’s a fact that the management of risk and compliance is becoming increasingly complicated. The compliance function requires more skills, experience and knowledge than ever before - especially with ...

Wem geben Sie (Cloud) Zugriff auf Ihre Daten

by Heinrich Wilking on 14 December 2018

  …Ein Überblick über die aktuelle IdM und Access Governance Situation… Nur sehr wenige Unternehmen können sich dem Digitalisierungstrend entziehen, der durch neue IT-Strategien und eine wachsende ...

We would love to hear your thoughts. Please leave a comment.

We can let you know when we have a new blog - subscribe here

* We respect your privacy and personal data. By submitting your details and downloading our document you are accepting Turnkey Consulting's privacy policy which can be found here.


For a 3 minute Introduction to Turnkey Consulting, Download Our 18 Page Flipboard Guide