Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In this session, we walk through a practical, real-world demonstration of how SU24 authorization defaults and SU24 variants can significantly reduce manual maintenance when building SAP roles. Using the widely-used MIGO transaction as an example, we show you how different business processes (such as Goods Receipts and Goods Issues) often require diff...
All content for SAP Security & GRC is the property of Soterion and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In this session, we walk through a practical, real-world demonstration of how SU24 authorization defaults and SU24 variants can significantly reduce manual maintenance when building SAP roles. Using the widely-used MIGO transaction as an example, we show you how different business processes (such as Goods Receipts and Goods Issues) often require diff...
Outlining the Essential Components for Effective GRC
SAP Security & GRC
34 minutes
2 years ago
Outlining the Essential Components for Effective GRC
listen to the SAP Security & GRC podcast with host Dudley Cartwright – helping you on your journey to effective access risk management in SAP. On this episode, we’ll guide you through the layers of The Effective GRC Pyramid, a powerful framework outlining the essential components for effective GRC. We’ll be joined by the following industry experts: Meindert Keuning from BR1GHT Emile Steyn from Soterion
SAP Security & GRC
Listen to the SAP Security & GRC podcast – helping you on your journey to effective access risk management in SAP. In this session, we walk through a practical, real-world demonstration of how SU24 authorization defaults and SU24 variants can significantly reduce manual maintenance when building SAP roles. Using the widely-used MIGO transaction as an example, we show you how different business processes (such as Goods Receipts and Goods Issues) often require diff...