On Sept. 6, director Kelly Richmond Pope will discuss a case in which a small town official stole $53 million in public funds over two decades to illustrate the importance of managing insider threats.
There's a growing disparity between IT professionals and the C-suite regarding SAP GRC concerns. Bridging this gap of understanding is the first step toward an effective compliance strategy.
According to a new report, threat actors are targeting enterprise resource planning (ERP) applications like SAP — and, in some cases, are exploiting a vulnerability that was disclosed in 2016.
The SAP HANA security evolution started in 2011, peaked in 2014 and continues to deliver critical enhancements to provide analysts with greater visibility.
Financial cybersecurity is more important than ever, according to a recent survey. Two-thirds of respondents reported suffering an attack in the past year.
Enterprises must protect their SAP systems through a combination of advanced security tools, support from C-level executives and other efforts.
Here are some steps to take into account when starting an identity and access management project, including creating user IDs and consolidating systems.