ON-DEMAND WEBINAR

The do's and don'ts of SAP security implementation in the cloud

Including SAP IAG and RISE with SAP

Available to watch on-demand now

The problem: Adoption of cloud-based SAP applications is accelerating – spurred on by the introduction of RISE with SAP and cloud apps like SAP IAG. But securing these applications is far from “lift and shift”, migration to the cloud comes with a whole host of new security considerations.

Watch here

We will always keep your information safe. We ask for the information contained in this form in exchange for a valuable resource. By sharing your information it will also ensure we, and any partners taking part in this webinar, are able to communicate with you in future. We will never send you information about our products and services by email, unless it has been specifically requested.

*We respect your privacy and personal data. By submitting your details and downloading our document you are accepting Turnkey Consulting's privacy policy which can be found here.

Meet your hosts

Team Card
Ed Davis
Managing Director APAC, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Simon Persin
Simon Persin
Global Practice Director, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Shane Kennedy
Shane Kennedy,
Business Development Specialist, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Robert Budic
Robert Budic
Managing Director, Australia, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Team Card
Ed Davis
Managing Director APAC, 
Turnkey Consulting
Simon Persin
Simon Persin
Global Practice Director, 
Turnkey Consulting
Shane Kennedy
Shane Kennedy,
Business Development Specialist, 
Turnkey Consulting
Robert Budic
Robert Budic
Managing Director, Australia, 
Turnkey Consulting
MicrosoftTeams-image (3)-3

The solution: While it’s common for security to be deprioritized if you want to avoid expensive remediation further down the line, it’s crucial to consider security at every stage of your SAP implementation (especially when migrating to the cloud). 

What we covered: In this webinar, we were joined by experts Peter Creal, Senior Director, SAP Finance and Risk COE, and Swetta Singh, Director, GRC Product Management at SAP. They covered all the security considerations you need to make, from discovery to implementation. We focused specifically on the cloud implementations and also shared advice that applies to all deployment approaches.

Specifically, we explored:
  • Secure stakeholder engagement through a better understanding of the risks
  • Capture security as a functional requirement of cloud solution
  • Map controls (like SoD) to business processes and incorporate tooling such as IAG to manage risk
  • Design (and build) with end-users and ongoing support in mind
  • Test controls alongside functionality
  • Use of IAG in ongoing operations for continuous management of identity risk

Related webinars

webinar

AI in SAP: Balancing Opportunity, Risk, and Control

webinar

Beyond the Brownfield Minefield: How to Make Your S/4HANA Migration a True Transformation

webinar

Mind the Gap: Security Responsibilities and Realities in RISE with SAP