Securely Yours LLC. Compliance made easy

Size: px
Start display at page:

Download "Securely Yours LLC. Compliance made easy"

Transcription

1 Securely Yours LLC SAP GRC Compliance made easy

2 What are our clients faced with SAP has enhanced roles but our clients are stuck with old definitions. They would like to re-design roles without breaking their bank Having a tool which will allow to recreate roles without compromising existing authority Enhance the SAP security posture enough to enable continuous control monitoring Reduce the cost and time it takes to redesign roles Reduce the cost and time it takes to perform Audits Having a SOD tool, which is easy to implement and is effective across SAP and non-sap environments 2

3 Typical Symptoms Internal auditors comment that users have too many transactions There is a persistent SOD problem There are too many roles in SAP and they are becoming unmanageable SAP security team cannot tell you what is assigned to users SAP security team spends too much time on user access request Need a review of your SAP installation before the external auditor to make sure you are in compliance 3

4 Securely Yours Solution Services and Tools for SAP to: Enhance SAP GRC Assessment Ensure Roles and Transactions are appropriately defined Wild Card use in SAP is appropriately analyzed SOD violations are appropriately reviewed and reported (across SAP and non-sap environments) Make Role Redesign process easier Compliance made easy with easy to use tools which report on changes from period to period 4

5 Solution Sample - Assessment 5

6 Solution Sample Role Design 6

7 Solution Sample - Compliance 7

8 Benefits of using our tools Identifies users with excessive SAP permission Keeps management compliant with audit reviews for appropriate access Reduces the time and cost of role re-redesign Provides a means of comparing user groups and users against assigned roles and transactions Improves the provisioning process Provides continuous monitoring so that compliance is maintained Reduces the time required in analyzing and creating new roles by over 50% Reduces the cost of role reengineering because of reduced time Identifies roles and users that should be assigned the same permissions Reduces the cost and time for internal and external audit review of an Sap installation Incorporates a usable naming convention for roles Tailors solution to an organization s processes

9 Team Members Sajay Rai Philip Chukwuma Sajay is the CEO of Securely Yours LLC. He has more than 32 years of experience in information technology, specializing in information technology architecture, information risks and controls, information strategy and planning. Prior to starting his company, Mr Rai was a Partner in Ernst & Young s Risk Advisory Solutions Practice. He was the Global Coordinating Partner for clients like Blue Cross Blue Shield of Michigan, Yazaki NA, Tecumseh and Compuware. He led major engagements at General Motors, Visteon and DTE. Prior to EY, Mr. Rai worked with IBM for 13 years, most recently serving as Managing Director of the national Business Continuity and Contingency consulting practice. He was instrumental in starting the company s Information Security consulting practice and managing its information technology consulting practice in Latin America. Mr. Rai co-authored a recently published book, Defending the Digital Frontier A Security Agenda. Mr. Rai is a regular speaker at industry conferences on information technology strategy, business continuity, digital security and general IT issues and is frequently quoted in magazines and newspapers. He holds a Masters degree in Information Management from Washington University of St. Louis, and a Bachelors degree in Computer Science from Fontbonne College of St. Louis. Philip is the CTO of Securely Yours, LLC. He Has over 20 years of experience in Information Technology and Information Security. Prior to joining Securely Yours, he was with Ernst & Young where he a Manager with the Risk Advisory practice. Philip specializes in IT Security, Identity and Access Management, ERP Integrity, SAP Security, Segregation of Duties (SOD), and Infrastructure Management (Problem, Incident, Change, Event Management, Active Directory, UNIX, etc). He has served in many industries including automotive, financial, manufacturing, and Oil & Gas. Philip has led several engagements as an Architect where he has invented ideas to streamline the implementation of security solutions. He has developed several tools related to IAM and SAP, which has saved his clients time and money. Philip s has extensive implementation experience in the area of Information Security and ERP systems. Philip received a bachelor s degree from the University of North Texas in Denton, and his M.B.A. from the same University. Philip also is a Certified Information Systems Security Professional (CISSP). Philip has extensive experience in IT and Information Security. 9

Secure Your ERP Environment with Automated Controls Naomi Iseri,Sr. GRC Solution Consultant

Secure Your ERP Environment with Automated Controls Naomi Iseri,Sr. GRC Solution Consultant Secure Your ERP Environment with Automated Controls Naomi Iseri,Sr. GRC Solution Consultant Agenda Introductions & Objectives Why Automate Controls What types of Automation Controls Do I Need When to Implement

More information

Securely Yours LLC. Identity and Access Management (IAM) IAM in a Cloud Auditing Guidelines IIA Detroit Chapter September 8, 2009

Securely Yours LLC. Identity and Access Management (IAM) IAM in a Cloud Auditing Guidelines IIA Detroit Chapter September 8, 2009 Securely Yours LLC Identity and Access Management (IAM) IAM in a Cloud Auditing Guidelines IIA Detroit Chapter September 8, 2009 Challenge of growing identities 2 IAM Manages explosion of ID s 3 What does

More information

Making intelligent decisions about identities and their access

Making intelligent decisions about identities and their access Making intelligent decisions about identities and their access Provision users and mitigate risks with Identity Governance and Intelligence Highlights Provide a business-centric approach to risk-based

More information

MIS 5121:Business Processes, ERP Systems & Controls Week 12: Table Security, Systems Development 2, Control Framework

MIS 5121:Business Processes, ERP Systems & Controls Week 12: Table Security, Systems Development 2, Control Framework MIS 5121:Business Processes, ERP Systems & Controls Week 12: Table Security, Systems Development 2, Control Framework Edward Beaver Edward.Beaver@temple.edu ff Video: Record the Class Discussion v Something

More information

Learn to streamline User Provisioning process in Oracle Applications with workflows

Learn to streamline User Provisioning process in Oracle Applications with workflows Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright. Fulcrum Information Technology, Inc. Learn to streamline User Provisioning process in

More information

Segregation of Duties for Infor-Lawson Software

Segregation of Duties for Infor-Lawson Software Segregation of Duties for Infor-Lawson Software 1 Agenda 2 Segregation of Duties for Infor-Lawson S3 Segregation of Duties About Us Benefits Definition Features Services Related Products About Us 3 Segregation

More information

Identity & Access Management Enabling e-government. Identity & Access Management (IAM) Defined

Identity & Access Management Enabling e-government. Identity & Access Management (IAM) Defined Identity & Access Management Enabling e-government Ed McCarthy, Director of Global Security Sales CA www.hcca-info.org 888-580-8373 Identity & Access Management (IAM) Defined Delivers answers to key questions:

More information

RouteONE Helping enhance the real value from SAP GRC Access Control

RouteONE Helping enhance the real value from SAP GRC Access Control RouteONE Helping enhance the real value from SAP GRC Access Control Contents Business context: Governance, risk and compliance Implementation: A challenge in itself Approach overview: SAP GRC Access Control

More information

Multi Support Next Invoices. Say hello to streamlined invoice approval and goodbye to costly routines involving paper, PDF s, and rogue s.

Multi Support Next Invoices. Say hello to streamlined invoice approval and goodbye to costly routines involving paper, PDF s, and rogue  s. www.multi-support.com Multi Support Next Invoices Say hello to streamlined invoice approval and goodbye to costly routines involving paper, PDF s, and rogue emails. Invoices - EDI invoices - Paper invoices

More information

Plugging the Gaps in Financial Controls Monitoring

Plugging the Gaps in Financial Controls Monitoring Plugging the Gaps in Financial Controls Monitoring Finance organizations are under duress to improve overall governance and are bearing substantial costs in maintaining monitoring and audit functions.

More information

Detect. Resolve. Prevent. Assure.

Detect. Resolve. Prevent. Assure. Detect. Resolve. Prevent. Assure. The Emerging Mandate: Continuous Monitoring of Enterprise Business Controls to Achieve Risk Intelligence In every industry, companies of every size are witnessing unprecedented

More information

Rapidly Reduce Segregation of Duty Violations in Oracle EBS R12 Responsibilities Session ID#: 15042

Rapidly Reduce Segregation of Duty Violations in Oracle EBS R12 Responsibilities Session ID#: 15042 Rapidly Reduce Segregation of Duty Violations in Oracle EBS R12 Responsibilities Session ID#: 15042 Responsibility templates from a catalog of pre-configured ERP roles. Workflow to update, review as well

More information

Leverage T echnology: Turn Risk into Opportunity

Leverage T echnology: Turn Risk into Opportunity Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright. Fulcrum Information Technology, Inc. Enhance security, improve helpdesk productivity,

More information

Global car and heavy equipment rental company, improves employee productivity with ERP Role Designer/Monitor

Global car and heavy equipment rental company, improves employee productivity with ERP Role Designer/Monitor Global car and heavy equipment rental company, improves employee productivity with ERP Role Designer/Monitor FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions

More information

Employee Lifecycle Management in an R12 World

Employee Lifecycle Management in an R12 World Employee Lifecycle Management in an R12 World May 21, 2009 Emrah Alpa, CISSP Services Architect April, 2009 Agenda > CA IAM Portfolio Overview > Employee Lifecycle Management Live Demo User On-Boarding

More information

CaféOne. The Unsung Hero of the Distribution Process. Session ID#: Prepared by: Kit Land Sr. Associate Grant Thornton LLC

CaféOne. The Unsung Hero of the Distribution Process. Session ID#: Prepared by: Kit Land Sr. Associate Grant Thornton LLC CaféOne Session ID#: 103540 The Unsung Hero of the Distribution Process Prepared by: Kit Land Sr. Associate Grant Thornton LLC #JDEINFOCUS or add your own Twitter handle Agenda Why I Am Here Why You Are

More information

EY Advisory: Driving business performance

EY Advisory: Driving business performance EY Advisory: Driving business performance Advisory EY s consulting practice Helping clients grow, protect and optimize their businesses Page 1 EY Advisory by the numbers 15,000+ Americas 20,000+ EMEIA

More information

Audit Trends & Framework for Improved Financial Reporting. Data Quality, Integrity, and Reliability

Audit Trends & Framework for Improved Financial Reporting. Data Quality, Integrity, and Reliability Audit Trends & Framework for Improved Financial Reporting Data Quality, Integrity, and Reliability Agenda Audit Readiness vs. Audit The Complexity of the DoD Environment The Role of Analytics Factors Contributing

More information

Adequate Accounting Systems for Cost-Type Work

Adequate Accounting Systems for Cost-Type Work Adequate Accounting Systems for Cost-Type Work Breakout Session #: C03 Presented by: Donna Dominguez & Aisha Mian Date: July 24, 2017 Time: 4:00 pm 2 About Aronson LLC Aronson LLC provides a comprehensive

More information

Session Number Who Owns. Sarah Thompson, PwC Risk Assurance Director

Session Number Who Owns. Sarah Thompson, PwC Risk Assurance Director Session Number Who Owns Segregation of Duties? Sarah Thompson, PwC Risk Assurance Director Agenda Introductions What is Segregation of Duties, Anyway? So Now I Know What It Is Why Do I Care? Sure, SoDis

More information

Is your ERP ready for COSO 2013?

Is your ERP ready for COSO 2013? Is your ERP ready for COSO 2013? Securing the ERP Webcast series February 26, 2015 Agenda COSO 2013 overview What is changing and what is not? Internal control definition Components and principles Transition

More information

Taking a Global, Value Added Approach to Compliance: Designing, Automating and Implementing an Integrated Controls Management Process

Taking a Global, Value Added Approach to Compliance: Designing, Automating and Implementing an Integrated Controls Management Process Taking a Global, Value Added Approach to Compliance: Designing, Automating and Implementing an Integrated Controls Management Process November 7, 2006 Webcast Today s Speakers Peter Paul Brouwers Partner,

More information

Mastering new and expanding financial services regulations and audits

Mastering new and expanding financial services regulations and audits IBM Software White Paper December 2010 Mastering new and expanding financial services regulations and audits 2 Mastering new and expanding financial services regulations and audits Contents 2 Executive

More information

Leveraging risk management for a strategic advantage

Leveraging risk management for a strategic advantage Leveraging risk management for a strategic advantage Alon Levy, Advisory Managing Partner (Israel) 5.6.2013 Conference Agenda עמוד 2 EY Global Reach * %age area revenue EY Global Professionals 168,000

More information

Change Management Best Practices for ERP Systems A Case Study from Audits of Oracle E-Business Suite Installations

Change Management Best Practices for ERP Systems A Case Study from Audits of Oracle E-Business Suite Installations Change Management Best Practices for ERP Systems A Case Study from Audits of Oracle E-Business Suite Installations Introduction - Jeffrey T. Hare, CPA CISA CIA Founder of ERP Risk Advisors Written various

More information

AGENDA. Agenda (50 Mins) Introduction of Topic and Welcome Audience- Moderator (5 Mins) Self Introduction by Panel members All (5 Mins Total)

AGENDA. Agenda (50 Mins) Introduction of Topic and Welcome Audience- Moderator (5 Mins) Self Introduction by Panel members All (5 Mins Total) Structured Road Map Approach for Relevancy and Impact of the Digital Information Age: Growth with SAP Business Platform 4 th SAP Aerospace & Defense Innovation Days March 7, 2017 AGENDA Agenda (50 Mins)

More information

Automotive finance. October 2014

Automotive finance. October 2014 Automotive finance October 2014 3 Automotive finance Growing in a changing environment The auto finance market has been in recovery since 2008. Record low interest rates, access to credit and new market

More information

Fastpath. Innovation in User Experience for Automated Controls SOLUTIONPERSPECTIVE EXPERIENCE. November 2017

Fastpath. Innovation in User Experience for Automated Controls SOLUTIONPERSPECTIVE EXPERIENCE. November 2017 November 2017 Fastpath Innovation in User Experience for Automated Controls EXPERIENCE 2017 SOLUTIONPERSPECTIVE Governance, Risk Management & Compliance Insight 2017 GRC 20/20 Research, LLC. All Rights

More information

Leverage T echnology: July 19 th, 2013 Adil Khan. Move Your Business Forward. Copyright. Fulcrum Information Technology, Inc.

Leverage T echnology: July 19 th, 2013 Adil Khan. Move Your Business Forward. Copyright. Fulcrum Information Technology, Inc. Life After ERP Go-Live: Navigating to Nirvana Learn how leading organizations are utilizing Advanced Controls to make systematic improvements in their ERP systems to achieve expected benefits of ERP systems

More information

A Financial Executive s Guide to Internal Controls & Fraud Prevention in the Cloud

A Financial Executive s Guide to Internal Controls & Fraud Prevention in the Cloud A Financial Executive s Guide to Internal Controls & Fraud Prevention in the Cloud July 2018 Greenlight Technologies. All rights reserved. 1 Speakers James Rice Vice President of Customer Solutions Greenlight

More information

Application Security Best Practices in an Oracle E- Business Suite Environment

Application Security Best Practices in an Oracle E- Business Suite Environment Application Security Best Practices in an Oracle E- Business Suite Environment Introduction - Jeffrey T. Hare, CPA CISA CIA Founder of ERP Risk Advisors Written various white papers on Internal Controls

More information

ERP IMPLEMENTATION RISK

ERP IMPLEMENTATION RISK ERP IMPLEMENTATION RISK Kari Sklenka-Gordon, Director at RSM National ERP Risk Advisory Leader March 2017 2015 2016 RSM US LLP. All Rights Reserved. Speaker Kari Sklenka-Gordon National RSM ERP Risk Advisory

More information

SAP GRC Risk Identification and Remediation

SAP GRC Risk Identification and Remediation September 26, 2007 English SAP GRC Risk Identification and Remediation Business Scenario Script for Discovery System version 3 SAP AG Neurottstr. 16 69190 Walldorf Germany Contents Introduction... 3 Statistical

More information

MIS 5121: ERP Systems - Course Schedule

MIS 5121: ERP Systems - Course Schedule Introduction 12-Jan 1 19-Jan 26-Jan 2 What is ERP? SAP Modules and functionality and its relation to Business Cycles AGAS: 3.1.3 (Figure 3.2) Real World: Control Failures - Enron Case The Importance of

More information

Securing Your Business in the Digital Age

Securing Your Business in the Digital Age SAP Solution in Detail SAP GRC Solutions SAP Access Control Securing Your Business in the Digital Age 1 / 13 Table of Contents 3 Quick Facts 4 Governing Access Efficiently in a Hyperconnected World 7 Analyzing

More information

Jeff Carpenter Authentication and Access Specialist RSA, The Security Division of EMC. Copyright 2015 EMC Corporation. All rights reserved.

Jeff Carpenter Authentication and Access Specialist RSA, The Security Division of EMC. Copyright 2015 EMC Corporation. All rights reserved. Jeff Carpenter Authentication and Access Specialist RSA, The Security Division of EMC 1 BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF MILLIONS OF USERS Mobile Cloud Big Data Social Mobile Devices

More information

The Keystone to Sarbanes-Oxley Compliance

The Keystone to Sarbanes-Oxley Compliance Fujitsu Glovia, Inc. 200 Continental Blvd., 3rd Floor El Segundo, CA 90245 U.S.A. Toll Free: (800) 223-3799 Phone: (310) 563-7000 Fax: (310) 563-7300 marketing@glovia.com www.glovia.com The Keystone to

More information

Why Oracle GRC with every E-Business Suite Upgrade

Why Oracle GRC with every E-Business Suite Upgrade Why Oracle GRC with every E-Business Suite Upgrade Kate Coughlin Principal Solution Consultant Why Preventive. Oracle Confidential - Do Not Distribute Why GRC for Every EBS Upgrade? Be compliant on Day

More information

Helping government agencies achieve mission success. Government and Public Sector (GPS)

Helping government agencies achieve mission success. Government and Public Sector (GPS) Helping government agencies achieve mission success Government and Public Sector (GPS) Table of contents 2 Government and Public Sector (GPS) Who we are Our purpose... 4 What we do Our perspective... 8

More information

IT Audit Process. Michael Romeu-Lugo MBA, CISA March 27, IT Audit Process. Prof. Mike Romeu

IT Audit Process. Michael Romeu-Lugo MBA, CISA March 27, IT Audit Process. Prof. Mike Romeu Michael Romeu-Lugo MBA, CISA March 27, 2017 1 Agenda Audit Planning PS 1203 / PG 2203 Evidence PS 1205 / PG 2205 References: ITAF 3 rd Edition Information Systems Auditing: Tools and Techniques Creating

More information

GE Security. Picture Perfect TM. The only UNIX Platform for Integrated Security Management and Access Control. Reliable. Flexible. Efficient.

GE Security. Picture Perfect TM. The only UNIX Platform for Integrated Security Management and Access Control. Reliable. Flexible. Efficient. GE Security Picture Perfect TM The only UNIX Platform for Integrated Security Management and Access Control Reliable. Flexible. Efficient. 15 years and counting Picture Perfect v4 is even more reliable,

More information

Easing the burden of data privacy compliance

Easing the burden of data privacy compliance Easing the burden of data privacy compliance EU General Data Protection Regulation (GDPR) managed services Introduction Companies should not underestimate the complexity of achieving and maintaining compliance

More information

Content Strategy + Development

Content Strategy + Development Content Strategy + Development UGA Means Business with New Approach to MBA Content Client: University of Georgia Terry College of Business / Industries: Higher Education, Business Administration content-science.com

More information

Access Manager. Authorization management for SAP Systems. Release 2016

Access Manager. Authorization management for SAP Systems. Release 2016 Access Manager Release 2016 The Access Manger is a component of our software package SUIM-AIM and is SAP certified. Authorization management for SAP Systems The Big Picture The Access Manger (AM) is a

More information

Supervisory Committee Expectations of Internal Audit

Supervisory Committee Expectations of Internal Audit Supervisory Committee Expectations of Internal Audit Alan N. Siegfried, MBA, CPA, CIA, CISA, CRMA, CCSA, CFSA, CGMA, CITP, CBA, CSP Theresa M. Grafenstine, CPA, CIA, CGAP, CISA, CGEIT, CRISC, CGMA June

More information

Infosys: Treating Governance and Compliance Strategically with SAP Access Control

Infosys: Treating Governance and Compliance Strategically with SAP Access Control Infosys: Treating Governance and Compliance Strategically with SAP Access Control Stringent management of user access controls and the segregation of duties are becoming a strategic concern for businesses

More information

Segregation of Duties: Best Practices for Cybersecurity and More

Segregation of Duties: Best Practices for Cybersecurity and More WHITE PAPER Segregation of Duties: Best Practices for Cybersecurity and More The news is filled with stories of alarming cybersecurity breaches, networks being hacked, and malware running amok. However,

More information

The revised Payment Services Directive (PSD2)

The revised Payment Services Directive (PSD2) Regulatory agenda updates The revised Payment Services Directive (PSD2) What you need to know Revised Payment Services Directive (PSD2) to increase scope, obligations, and to offer business opportunities

More information

IT Service Delivery And Support

IT Service Delivery And Support IT Service Delivery And Support Week Ten Auditing Application Control IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 Transactional Applications vs. Support Application Application Controls

More information

Take-aways from EY s series of Internal Audit Analytics roundtables over 2016

Take-aways from EY s series of Internal Audit Analytics roundtables over 2016 Take-aways from EY s series of Internal Audit Analytics roundtables over 2016 2 Amsterdam Roundtable on Data Analytics for Internal Audit Over 2016 EY hosted a series of roundtables with key executives

More information

Entitlement Management

Entitlement Management PRODUCT BROCHURE Entitlement Management Why Entitlement Management? Managing fine-grain authorizations to applications and data has become a critical business challenge, highlighted by the requirement

More information

Fraud risk management in not for profit organisations

Fraud risk management in not for profit organisations Fraud risk management in not for profit organisations TJ Koekemoer Director Ernst & Young, Australia 1 May 2012 Agenda Introduction The fraud landscape Understanding fraud risks using the fraud triangle

More information

practical guidelines to successfully manage value at risk

practical guidelines to successfully manage value at risk SAP Security 2014 Protecting Your SAP Systems Against Hackers And Industrial Espionage SAP access governance practical guidelines to successfully manage value at risk Wouter Janssen, axl & trax 2014 topics

More information

Security and risk governance. An operational model

Security and risk governance. An operational model Security and risk governance An operational model Table of Contents Ecosystem not Enterprise Segregation of duties Operating model Organizational structure Governance The benefits Forward steps 2 3 4 5

More information

INTELLIGENT IAM FOR DUMMIES. SecureAuth Special Edition

INTELLIGENT IAM FOR DUMMIES. SecureAuth Special Edition INTELLIGENT IAM FOR DUMMIES SecureAuth Special Edition TABLE OF CONTENTS Introduction... 3 Introducing Intelligent Identity and Access Management (IIAM)... 4 What Can IIAM Do for You?... 7 Analyzing Account

More information

Digital Passport. Transforming SME banking through customer-permissioned data exchange

Digital Passport. Transforming SME banking through customer-permissioned data exchange Digital Passport Transforming SME banking through customer-permissioned data exchange Contents The Digital Passport 3 How the Digital Passport works 4 Why EY? 7 Contacts 7 The Digital Passport Putting

More information

2013 IIA FALL CONFERENCE BIRMINGHAM CHAPTER

2013 IIA FALL CONFERENCE BIRMINGHAM CHAPTER 2013 IIA FALL CONFERENCE BIRMINGHAM CHAPTER Wednesday October 16, 2013 - Thursday October 17, 2013 Embassy Suites Hotel and Conference Center 2300 Woodcrest Place Birmingham, Alabama 35209 PRICING & REGISTRATION

More information

GRC300. SAP BusinessObjects Access Control Implementation and Configuration COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day(s)

GRC300. SAP BusinessObjects Access Control Implementation and Configuration COURSE OUTLINE. Course Version: 15 Course Duration: 5 Day(s) GRC300 SAP BusinessObjects Access Control 10.0 - Implementation and Configuration. COURSE OUTLINE Course Version: 15 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2017 SAP SE or an SAP affiliate

More information

GRC300. SAP Access Control Implementation and Configuration COURSE OUTLINE. Course Version: 16 Course Duration: 5 Day(s)

GRC300. SAP Access Control Implementation and Configuration COURSE OUTLINE. Course Version: 16 Course Duration: 5 Day(s) GRC300 SAP Access Control Implementation and Configuration. COURSE OUTLINE Course Version: 16 Course Duration: 5 Day(s) SAP Copyrights and Trademarks 2016 SAP SE or an SAP affiliate company. All rights

More information

HOW TO IMPROVE THE PROCUREMENT PROCESS THROUGH SUPPLIER COLLABORATION WITH SAP ARIBA ABOUT OUR CLIENT

HOW TO IMPROVE THE PROCUREMENT PROCESS THROUGH SUPPLIER COLLABORATION WITH SAP ARIBA ABOUT OUR CLIENT HOW TO IMPROVE THE PROCUREMENT PROCESS THROUGH SUPPLIER COLLABORATION WITH SAP ARIBA ABOUT OUR CLIENT Our client has been working in the energy sector for decades and today is one of the main power operators

More information

AGENDA USING CONTINUOUS CONTROLS MONITORING TO MAXIMIZE P2P CONTROLS & RISK PREVENTION. Welcome! 60-second FISCAL Overview. Change in Purchase-to-Pay

AGENDA USING CONTINUOUS CONTROLS MONITORING TO MAXIMIZE P2P CONTROLS & RISK PREVENTION. Welcome! 60-second FISCAL Overview. Change in Purchase-to-Pay USING CONTINUOUS CONTROLS MONITORING TO MAXIMIZE P2P CONTROLS & RISK PREVENTION Welcome! Mike LaDuke AGENDA 60-second FISCAL Overview Change in Purchase-to-Pay Escalation of Fraud Incidences What is Continuous

More information

Risk-based Assessment of User Access Controls and Segregation of Running Oracle Applications Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars

Risk-based Assessment of User Access Controls and Segregation of Running Oracle Applications Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars Risk-based Assessment of User Access Controls and Segregation of Duties for Companies Running Oracle Applications Presented by: Jeffrey T. Hare, CPA CISA CIA ERP Seminars Presentation Agenda Overview:

More information

MIS 5121: ERP Systems - Course Schedule Spring 2016

MIS 5121: ERP Systems - Course Schedule Spring 2016 Course Intro - Review Syllabus Personal Intro: Me, Students What is ERP? 11-Jan 1 18-Jan 25-Jan 2 ERP Systems Suppliers, SAP technology Background Break Real World: Control Failures - Enron Case Intro

More information

Session 2B Application of Robotic Process Automation on Actuarial Function. Pu Sheng, FSA

Session 2B Application of Robotic Process Automation on Actuarial Function. Pu Sheng, FSA Session 2B Application of Robotic Process Automation on Actuarial Function Pu Sheng, FSA The SOA Asia-Pacific Annual Symposium 6-7, July 2017 Robotic Process Automation Application for Insurers 2 About

More information

Essential IT Considerations for Sarbanes-Oxley Act

Essential IT Considerations for Sarbanes-Oxley Act Essential IT Considerations for Sarbanes-Oxley Act Fulcrum Information Technology, Inc. 2050 North Collins Blvd, Suite 125 Richardson, Texas 75080 Phone: 972-312-8500 Fax: 214-242-3939 Table of Contents

More information

Dennis L. Bolles, PMP 120 Beth Street Holland, MI 49424

Dennis L. Bolles, PMP 120 Beth Street Holland, MI 49424 My objective as a short term SME consultant is to assist organizations achieve their business strategic objectives with the analysis of business process improvement needs and development of business and

More information

A GUIDE TO FINANCIAL CLOSE MANAGEMENT. 3 Steps to Moving Up the Value Chain

A GUIDE TO FINANCIAL CLOSE MANAGEMENT. 3 Steps to Moving Up the Value Chain 3 A GUIDE TO 3 Steps to Moving Up the Value Chain 1 Evolving Your Financial Close Process to a Value-Adding Activity Have you felt it too? The pressure to do more with less? Like everything else in business,

More information

White Paper Enforcing Segregation of Duties (SoD)

White Paper Enforcing Segregation of Duties (SoD) White Paper Enforcing Segregation of Duties (SoD) A real problem growing out of proportion with poorly designed access controls Page 2 Enforcing segregation of duties In recent years many IT organizations

More information

Optimize Projects and Enhance Your Landscape with Continuous Quality Checks. Mike Mikovsky November 2, 2016

Optimize Projects and Enhance Your Landscape with Continuous Quality Checks. Mike Mikovsky November 2, 2016 Optimize Projects and Enhance Your Landscape with Continuous Quality Checks Mike Mikovsky November 2, 2016 Disclaimer The information in this presentation is confidential and proprietary to SAP and may

More information

Writing an Audit Finding. Danny M. Goldberg Professional Development Practice Director

Writing an Audit Finding. Danny M. Goldberg Professional Development Practice Director Writing an Audit Finding Danny M. Goldberg Professional Development Practice Director 2 Danny M. Goldberg Professional Development Practice Director, Sunera (www.sunera.com) Founding Partner, SOFT GRC

More information

Risk Advisory SERVICES. A holistic approach to implementing effective governance, managing risk and maintaining compliance

Risk Advisory SERVICES. A holistic approach to implementing effective governance, managing risk and maintaining compliance Risk Advisory SERVICES A holistic approach to implementing effective governance, managing risk and maintaining compliance Contents Weaver's Risk Advisory Services 1 Enterprise Risk Management 4 Assessing

More information

GDPR Services NEAT EVALUATION FOR DXC TECHNOLOGY: Introduction. Market Segment: Overall

GDPR Services NEAT EVALUATION FOR DXC TECHNOLOGY: Introduction. Market Segment: Overall NEAT EVALUATION FOR DXC TECHNOLOGY: GDPR Services Market Segment: Overall Introduction This is a custom report for DXC Technology (DXC) presenting the findings of the NelsonHall NEAT vendor evaluation

More information

THE U.S. SERVICE MARKET SIZE, STRUCTURE AND FORECAST FOR THE 21 ST CENTURY A STRATEGIC VIEW. A White Paper for the Reverse Logistics Industry

THE U.S. SERVICE MARKET SIZE, STRUCTURE AND FORECAST FOR THE 21 ST CENTURY A STRATEGIC VIEW. A White Paper for the Reverse Logistics Industry THE U.S. SERVICE MARKET SIZE, STRUCTURE AND FORECAST FOR THE 21 ST CENTURY A STRATEGIC VIEW A White Paper for the Reverse Logistics Industry Copyright 2004 Reverse Logistics Trends, Inc. THE U.S. SERVICE

More information

Data integrity forensics Bring transparency and trust to third-party data use

Data integrity forensics Bring transparency and trust to third-party data use Legal, Compliance and Technology Webcast Series Sponsored by EY Forensic & Integrity Services Bring transparency and trust to third-party data use 24 October 2018 Today s speakers Moderator: Eric Derk

More information

The two sides of managing Identity Risk

The two sides of managing Identity Risk The two sides of managing Identity Risk Enforcing segregation of duties by means of provisioning and attestation 2nd European Identity Conference Dr. Martin Dehn KOGIT GmbH Agenda Introduction SoD The

More information

ADP Sales Tax Solutions at Siemens A Case Study. January 21, pm EST

ADP Sales Tax Solutions at Siemens A Case Study. January 21, pm EST ADP Sales Tax Solutions at Siemens A Case Study January 21, 2008 12-1pm EST 1 Housekeeping Items Today s webinar will last for 60 minutes, ending at 1pm eastern time. The last 10 minutes of today s program

More information

Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions

Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions Automating PeopleSoft Segregation of Duties: Financials/HCM/Campus Solutions Lewis Hopkins, Sr. Applications Consultant November 13, 2014 Reminders A recording of today s session will be sent to all registrants

More information

Interaction with Management on Smaller Entity Audits

Interaction with Management on Smaller Entity Audits Interaction with Management on Smaller Entity Audits Presented by ADRIAN GIBBONS BSc ACA Copyright information Source material Any extracts from Auditing Standards, Practice Notes, APB Bulletins and Accounting

More information

International Financial Reporting Standards (IFRS) Seminar. IFRS in practice the global experience Tehran, April 2017

International Financial Reporting Standards (IFRS) Seminar. IFRS in practice the global experience Tehran, April 2017 International Financial Reporting Standards (IFRS) Seminar IFRS in practice the global experience Tehran, 24 25 April 2017 Sponsor Securities & Exchange Organization 2 Introduction The harmonization of

More information

See how SailPoint helps organizations around the globe.

See how SailPoint helps organizations around the globe. Customer Successes CASE STUDIES See how SailPoint helps organizations around the globe. SALLIE MAE REDUCES COMPLIANCE PRESSURES ADOBE REPLACES LEGACY PROVISIONING WITH NEXT-GEN IAM ING DIRECT AUSTRALIA

More information

A Glovia White Paper. The Keystone to Sarbanes-Oxley Compliance

A Glovia White Paper. The Keystone to Sarbanes-Oxley Compliance TM Powerful Solutions for Manufacturers The Keystone to Sarbanes-Oxley Compliance Designing a Practical Application S e c u r i t y Fr a m e w o r k U s i n g g l o v i a. c o m A Glovia White Paper Table

More information

Streamlining Access Control for SAP Systems

Streamlining Access Control for SAP Systems WHITE PAPER Streamlining Access Control for SAP Systems The Many Advantages of Automated User Provisioning For organizations with high-volumes of employees leveraging SAP solutions, managing access to

More information

Minimizing fraud exposure with effective ERP segregation of duties controls

Minimizing fraud exposure with effective ERP segregation of duties controls Minimizing fraud exposure with effective ERP segregation of duties controls Prepared by: Luke Leaon, Manager, RSM US LLP luke.leaon@rsmus.com, +1 612 629 9072 Adam Harpool, Manager, RSM US LLP adam.harpool@rsmus.com,

More information

Oracle s GRC Strategy is Flawed and Failing their Customers

Oracle s GRC Strategy is Flawed and Failing their Customers Oracle recently changed their strategy for their GRC software and is moving towards cloud-based solutions. My sense, from hearing from friends and colleagues in the space, is that Oracle s change in strategy

More information

Protecting Your IT Network from Financial Fraud

Protecting Your IT Network from Financial Fraud Protecting Your IT Network from Financial Fraud Illinois Community College CFOs Mark Wilson, CISSP, ITIL, CBCP, CCM Director of Information Risk Management Agenda What is Fraud? Interesting Statistics

More information

25th Annual Health Sciences Tax Conference

25th Annual Health Sciences Tax Conference 25th Annual Health Sciences Tax Conference Impact of life sciences M&A activity on tax operations and compliance December 9, 2015 Disclaimer EY refers to the global organization, and may refer to one or

More information

Wokingham Borough Council

Wokingham Borough Council Wokingham Borough Council Audit Committee Summary For the year ended 31 March 2015 Audit Results Report ISA (UK & Ireland) 260 September 2015 Contents Page Section 1 Executive summary 3 Section 2 Extent

More information

Rapidly Reduce Segrega/on of Duty Viola/ons in Oracle EBS R12 Responsibili/es

Rapidly Reduce Segrega/on of Duty Viola/ons in Oracle EBS R12 Responsibili/es Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright. Fulcrum Information Technology, Inc. Rapidly Reduce Segrega/on of Duty Viola/ons in Oracle

More information

SOLUTION BRIEF IDENTITY AND ACCESS GOVERNANCE. Simplify Identity Governance and Reduce Risk With the CA Identity Suite

SOLUTION BRIEF IDENTITY AND ACCESS GOVERNANCE. Simplify Identity Governance and Reduce Risk With the CA Identity Suite SOLUTION BRIEF IDENTITY AND ACCESS GOVERNANCE Simplify Identity Governance and Reduce Risk With the CA Identity Suite 2 SOLUTION BRIEF: IDENTITY AND ACCESS GOVERNANCE Section 1: Challenge Identity Governance

More information

EY Digital Boardroom. Overview. EY Digital Boardroom 1

EY Digital Boardroom. Overview. EY Digital Boardroom 1 EY Digital Boardroom Overview EY Digital Boardroom 1 Dear EY community, Markus Heinen Partner, Advisory Services EY GSA The disruption of finance functions is not a reality of the distant future but actually

More information

Eliminating Audit Anxiety

Eliminating Audit Anxiety Eliminating Audit Anxiety Nonprofit Accounting Whitepaper A whitepaper by David Capitano www.serenic.com Copyright 2018. Serenic Software. While some nonprofits think of a financial statement audit as

More information

Continuous Controls Monitoring for Transactions: The Next Frontier for GRC Automation

Continuous Controls Monitoring for Transactions: The Next Frontier for GRC Automation Research Publication Date: 15 January 2009 ID Number: G00164382 Continuous Controls Monitoring for Transactions: The Next Frontier for GRC Automation French Caldwell, Paul E. Proctor Continuous controls

More information

How does treasury adapt to the finance function of the future?

How does treasury adapt to the finance function of the future? How does treasury adapt to the finance function of the future? October 2017 The better the question. The better the answer. The better the world works. Contents 1 2 How does treasury adapt to the finance

More information

What is hiding in your procurement to payment cycle? 24 September 2013

What is hiding in your procurement to payment cycle? 24 September 2013 What is hiding in your procurement to payment cycle? 24 September 2013 Introductions Anna Bourne SER Risk Leader/EP for the State of Georgia Email: annamarie.bourne@ey.com Phone: (404) 541-7263 Brad Duncan

More information

F E A T U R I N G. Work Smarter, Not Harder

F E A T U R I N G. Work Smarter, Not Harder F E A T U R I N G Work Smarter, Not Harder Speakers emoney Advisor Kyle Wharton: Head of Business Development Alex Rines: Integrations Developer Jessica Liberi: Business Analyst Morningstar Kartik Srinivasan:

More information

... Preface Acknowledgments SAP Governance, Risk, and Compliance Overview Planning SAP GRC Implementations...

... Preface Acknowledgments SAP Governance, Risk, and Compliance Overview Planning SAP GRC Implementations... ... Preface... 19... Structure of This Book... 20... Target Audience... 20... How to Use This Book... 21... Conclusion... 21... Acknowledgments... 23 1... SAP Governance, Risk, and Compliance Overview...

More information

Global transformation journey enabled by SAP Ariba solutions. SAP Ariba LIVE 2017

Global transformation journey enabled by SAP Ariba solutions. SAP Ariba LIVE 2017 Global transformation journey enabled by SAP Ariba solutions SAP Ariba LIVE 2017 Introductions Brad Inman Ernst & Young LLP Senior Manager Supply Chain Advisory brad.inman@ey.com Andrew Simpson Ernst &

More information

BUSINESS OVERVIEW CORPORATE PROFILE

BUSINESS OVERVIEW CORPORATE PROFILE 2017 BUSINESS OVERVIEW CORPORATE PROFILE About us Business Technology Management Group (BTMG USA). A premium Business Software Development, I.T skills training and placement company founded in 2009 based

More information

INTERNAL CONTROL: COMPLIANCE, OPERATIONAL AND FINANCIAL

INTERNAL CONTROL: COMPLIANCE, OPERATIONAL AND FINANCIAL INTERNAL CONTROL: COMPLIANCE, OPERATIONAL AND FINANCIAL SECTOR / INTERNAL AUDIT NON-TECHNICAL & CERTIFIED TRAINING COURSE The course then tackles controls at board and senior management level and into

More information

conduct business with over a hundred outsourcing companies around the world to aid them in their business. Deloitte has been ranked for four straight

conduct business with over a hundred outsourcing companies around the world to aid them in their business. Deloitte has been ranked for four straight Brandon Eddlestone Deloitte Question 1 for Chapter 1: Deloitte is one of the Big Four accounting firms, along with PricewaterhouseCoopers, Ernst & Young, and KPMG, which provide services such as audit,

More information