Retrouvez en accès libre sur cette base documentaire, l’ensemble de nos webinars, guides, présentations et autres contributions autour de la sécurité IT.
Buckle up with us on 17 October for a live webinar developed to help you navigate the future of Identity Governance and Administration (IGA) for SAP.
Join us to hear the latest news and recommendations from SAP and learn what you need to consider to achieve effective identity and access governance across your SAP estate and beyond.
This guide explores the practical solutions to help your organisation effectively manage your access risk. Beyond helping you avoid compliance issues in the long-term, our guidance will assist you in unlocking scalability and growth, whatever the future business and compliance landscapes might look like.
As the extended 2027 deadline for S/4HANA migration looms, organisations are at a crucial juncture in their planning process. While you may be considering a brownfield migration, this approach would mean missing a major opportunity to unleash business success.
In this webinar, we explored the business-enabling benefits of a security-centred S/4HANA migration and how you can ensure security and associated risks are professionally managed during implementation.
With more remote workforces, increased outsourcing and a heightened dependence on third party collaboration, knowing who is accessing your systems and controlling what they can do within your environment is a fundamental measure for accessing systems and data.
In this webinar, Steve Toole, Principal Solution Consultant at SailPoint and Tom Venables, Enterprise Solutions Director at Turnkey, will discuss the importance of extending your identity governance solutions to business-critical business applications so your organization can grow with the expected rate of change.
In recent years, there has been a substantial shift in the global attitude towards cybersecurity legislation.
In the past, it was normal for governments to take a ‘guidance’ approach, where they would generally draw up guidelines with the best practices that businesses should follow but without any enforcement.
That's all about to change.
Up to 88% of data breaches are caused by human error, meaning that even well-intentioned employees can jeopardise an organisation's security if they lack awareness and understanding of the risks they pose.
Yearly cybersecurity training and one-off phishing drills are no longer enough to keep organisations safe. As the cybersecurity landscape continues to evolve, business leaders must prioritise mitigating risk wherever possible, starting in-house.
This webinar explored how to move beyond compliance-driven, tick-box training and create a secure culture.
Cybersecurity legislation in the US has developed considerably in recent months – with the changes to the FTC’s Safeguards Rule coming into force in June, and for publicly listed companies, a deadline of December 1st to prepare for new cyber rules from the SEC.
In this webinar, Jannie Wentzel, Partner & Principal Consultant at Cential Consulting helped to break down the requirements of SEC and FTC cybersecurity regulations and prepare for compliance.
Accurate, up-to-date, and consistent data is vital to a successful IAM (Identity and Access Management) strategy but achieving and maintaining data quality and alignment can be a major challenge.
Despite the importance of data within IAM projects, it’s an area that is commonly overlooked during implementation – often resulting in unnecessarily long project planning phases, unexpectedly high costs, poorer user experiences, and an increased risk of Priority 1 incidents, security breaches, and adverse audit findings.
This webinar uncovered a roadmap for achieving and maintaining data excellence in the Identity and Access Management programme.
Including SAP IAG and RISE with SAP
In this webinar, we were joined by experts Peter Creal, Senior Director, SAP Finance and Risk COE, and Swetta Singh, Director, GRC Product Management at SAP. They covered all the security considerations you need to make, from discovery to implementation.
We focused specifically on the cloud implementations and also shared advice that applies to all deployment approaches.
For SAP customers, the traditional, perimeter-based approach to cybersecurity is increasingly unfit for purpose.
In response to this, many SAP customers are moving toward a Zero Trust model. This approach promises to better protect SAP customers, but how can it be deployed effectively?
We answer all of your questions in our latest guide, which is designed to give SAP customers a practical roadmap toward Zero Trust maturity.
In a rapidly evolving corporate landscape, the Financial Reporting Council (FRC) has launched a consultation on proposed revisions to the Corporate Governance Code.
On this panel discussion, we’re joined by industry experts including Richard Anderson, Chair of the Banking Competition Remedies and Chris Mills, Corporate Governance SME at Diligent who will delve into the proposed revisions, their implications, and potential solutions to enhance corporate accountability.
Managing internal controls is becoming more and more difficult for enterprise-level organisations – compliance demands are increasing, while the cost-of-living crisis has seen the risk of internal fraud grow.
To help better protect their organisations, many SAP customers are turning to SAP Process Control. But choosing the right tool is just the start, getting the implementation right is biggest determinant of success.
Now updated for 2023, this very practical guide has been created to help SAP customers understand the new security considerations that come with implementing SAP S/4 HANA.
We want you to side-step the mistakes of retrospective security work - so prevalent with past ERP projects. So, while there is still time to plan your migration, this guide will help you do so with security and compliance very much in mind.
Ever increasing compliance demands make internal controls a difficult challenge for enterprise-level organisations. Non-compliance can lead to severe penalties, as well as reputational damage, and disruption to business processes.
A key part in managing internal controls effectively is adopting the right technology. In this webinar, we’ll introduce SAP’s Financial Compliance Management (FCM) solution. We’ll discuss which compliance processes can be managed by SAP FCM
In December 2022, the European Union confirmed they are moving ahead with plans to expand the scope of the Network and Information System (NIS) Directive - instigating a ‘high common level of cybersecurity across the Union’.
In this guide, we provide a comprehensive overview of NIS2, including the specific sectors NIS2 applies to, new security reporting obligations, and the sanctions which will be enforced for non-compliance.
Organisations invest heavily in risk, security, and controls tooling, but budget constraints have made securing investment for new tooling difficult. Meanwhile, the risks organisations face are constantly growing.
This webinar provides practical guidance on unlocking the potential of risk, security, and controls shelfware to better protect organisations, especially as budget cuts and freezes are becoming more and more common.
Data privacy is a very complex topic, and most organisations struggle to manage the explosion of data across their corporate networks. What is considered Highly Sensitive, Sensitive, or Confidential is not always clearly defined and communicated. Common misconceptions lead to unintended download and management of sensitive data through tightly restricted access impeding the organisation’s ability to leverage the value of the data.
Watch this three-part series on data privacy; from identifying the existence of privacy data across your corporate landscape. Developing an action plan...
Despite hacking incidents almost doubling in the past year, many pharmaceutical companies still rely on manual and error-prone approaches to Identity & Access Management (IAM).
In this webinar, we were joined by Paul Squires, Lead Identity Strategist UK&I at SailPoint, to explore how Identity Governance and Administration (IGA), an automated and centralised approach to IAM, can help pharmaceutical companies move towards more efficient and secure operations.
Over a third of all identity-related breaches involve privileged accounts. To tackle this, many businesses are choosing to undertake Privileged Access Management (PAM) projects, but they're often hindered by oversights and mistakes.
In this guide, we run through four common pitfalls businesses have to navigate to get PAM right. Plus, we've included first-hand insights from Matt Smith, Director of Cyber & Information Security at St James’s Place.
Organisations in the fast-paced pharmaceutical industry face a difficult balancing act between agility and security.
In this guide, we outline why Identity Governance and Administration (IGA), an automated, centralised approach to IAM, can help pharmaceutical companies avoid the pitfalls of traditional methods and move towards more efficient and secure operations.
In this report, we go through the findings from the 2022 Higher Education Cybersecurity survey in detail, exploring where security provisions may be lacking and improvements can be made.
The report also contains insights directly from higher education cybersecurity professionals giving their thoughts on the results.
Il s’agit du deuxième guide créé par Turnkey, SailPoint et Onapsis, qui forment conjointement The Security Hub. Cette collaboration représente trois piliers de la sécurité SAP : sécurité des applications (Onapsis), gestion des identités et des accès (SailPoint), conseils et mise en œuvre efficaces (Turnkey).
Collectivement, The Security Hub possède une vaste expertise couvrant chaque aspect de la sécurité SAP. Ce guide rassemble différents points de vue d’experts visant à faire comprendre comment les entreprises peuvent relever les défis liés à la protection de leurs données et de leurs systèmes stratégiques à une époque où l’image traditionnelle des périmètres réseau n’est plus ce qu’elle était.
Près de 90 % des professionnels de la cybersécurité évoluant dans le domaine de l’enseignement supérieur que nous avons interrogés déclarent avoir le sentiment que leur organisation fait l’objet d’une attaque au moins une fois par jour, ce qui en dit long sur la volatilité du paysage des risques pour ces établissements.
C’est l’une des nombreuses conclusions de notre enquête 2022 sur la cybersécurité dans le secteur de l’enseignement supérieur, à laquelle ont participé des collaborateurs de plus de 20 établissements de l’enseignement supérieur.
Lors de ce webinaire, nous avons été rejoints par CyberRes avec qui nous avons passé en revue de façon détaillée l’intégralité des conclusions de notre enquête.
Les 12 et 13 octobre 2022, des experts du risque, de la sécurité et de l’identité du monde entier nous ont rejoints pour participer à la rencontre Entreprise à risque en 2022 : un événement virtuel organisé par Turnkey.
Les sessions, animées par des collaborateurs de BP, St James’s Place, Carlsberg Group, Birmingham City University, UKISUG et de nombreuses autres organisations, ont présenté différentes façons pratiques de garder une longueur d’avance dans le paysage des risques en perpétuelle évolution et de rendre le monde des affaires plus sûr. Les sujets abordés étaient très variés, de la protection de vos applications stratégiques au maintien d’une visibilité sur les risques à l’échelle de l’entreprise.
Dans ce guide, nous présentons les différentes options disponibles pour la solution IAG de SAP, en analysant de façon détaillée quatre cas d’utilisation afin de vous aider à choisir l’approche qui vous convient le mieux. Nous présentons également les aspects clés à prendre en compte dans chaque scénario pour vous éviter de commettre les erreurs les plus fréquentes en matière de mise en œuvre.
Whilst many businesses rely on hardware and software-based defences, the human firewall is often the first and best line of defence. With that in mind, generic annual cybersecurity training for end-users just won't cut it anymore.
In this webinar, Jacqueline Jayne, KnowBe4's Security Awareness Advocate for APAC, explored new and innovative ways businesses can engage end-users with cybersecurity best practices.
In this four-part webinar series, we were joined by leading risk, compliance, and audit experts to give an update on the latest UK SOX developments, how you can start preparations, and what you can learn from US SOX compliance programmes.
Our bite-size, 20-minute sessions include:
1. UK SOX: What we know so far
2. UK SOX: What organisations can learn from US compliance programmes
3. The role of technology in SOX compliance
4. Practical steps to prepare for UK SOX
Managing internal controls is becoming more and more difficult for enterprise-level organisations – compliance demands are increasing, while the cost-of-living crisis has seen the risk of internal fraud grow.
To help better protect their organisations, many SAP customers are turning to SAP Process Control. But choosing the right tool is just the start, getting the implementation right is biggest determinant of success.
Migrating to the cloud, including a shift to SAP S/4 HANA, promises business agility and adaptability, but it also introduces control challenges that, if left unaddressed, could expose your business to risk.
In this webinar, we were joined by Susan Stapleton, Director of Partner Advisory at Pathlock, to explore how Continuous Control Monitoring for user risks can play a pivotal role in enabling a smooth, secure transformation to SAP S/4 HANA.
On Thursday the 19th of May, we explored how SAP customers can use Business Integrity Screening (BIS) to automate the screening of their sanctioned party lists with a defined set of rules.
We covered the best practices for using BIS to ensure you aren't associated or partnered with sanctioned organisations.
RISE with SAP is a cloud-based subscription service, designed to enable innovation and digital transformation.
In this webinar, we were joined by Andy Steer, VP & CTO at NTT DATA Business Solutions, to highlight all of the security and compliance pitfalls you’re likely to face during implementation - and help you avoid them.
SAP Cloud Identity Access Governance (IAG) is considered by many SAP customers as "Access Control in the cloud". But setting up IAG does not always mean replacing Access Control.
In this webinar, we were joined by Gabriele Fiata from SAP, who explored the different implementation options for SAP IAG. Experts from Turnkey also shared learnings from recent implementation projects and covered four unique use-cases for SAP IAG implementations.
When it comes to getting the most out of training your end-users on cybersecurity, annual training just won't cut it anymore.
In this webinar, Jacqueline Jayne, KnowBe4's Security Awareness Advocate for APAC, joined us to share how you can create your own (or refresh your existing) cybersecurity education and awareness program to change behaviour.
Many businesses don't have SAP Cyber Security in place as they think they don't have the resources, or that it's too complicated to implement.
In this webinar from Turnkey Germany, we were joined by Christoph Nagy, the CEO at SecurityBridge, to explore how businesses can get a 360-degree view of their SAP Security posture, and ensure their SAP operations are properly secured.
A series of critical vulnerabilities affecting the SAP Internet Communication Manager (ICM) component have been identified by Onapsis. The most severe vulnerability has a CVSSv3 score of 10 and could have a considerable impact on your organisation if exploited.
In this recorded webinar, we were joined by Onapsis to explore the impact this could have on your organisation, and the actions you need to take now to avoid any damage.
Identity and Access Management (IAM) is a set of principles that, through the use of technology, ensures the right people, get the right access at the right time.
In this eBook, we explore why this presents a risk to your organisation, in terms of reduced productivity, financial losses, regulatory non-compliance and the threat of cyber attack
Despite being critical to the seamless running of the organisation, security and risk and often overlooked when it comes to protecting your infrastructure.
In this guide, we'll look at how you can take a pragmatic approach to Privileged Access Management - helping you reduce the threats to your infrastructure.
For UKISUG Connect 2021, Turnkey, SailPoint and Onapsis joined forces to form the Security Hub, representing the three core pillars of SAP security.
In this guide, we'll cover the current cyber threat landscape, the barriers to effective SAP IAM, and how you can build security into your S/4 HANA migration.
Many businesses think their current cyber security practices are enough to prevent ransomware infiltration, however, ransomware capitalizes on human error - which technology alone cannot protect you from.
In this webinar, we were joined by KnowBe4 to explore the current threat from ransomware, and why the "human-layer" is such a critical part of your defense.
Having a robust but flexible risk and controls management structure is more of a necessity for companies today than it ever has been before. Often known as ‘Integrated GRC’, a defined structure can be critical to an effective risk management strategy.
In this webinar, we were joined by SAP's Chris Johnston to explore how the SAP product suite can enable this approach.
In this on-demand webinar, we explore the findings of our SAP Privileged Access Management Survey 2021, run in conjunction with CyberArk.
We also break down what the results will mean for IAM teams in the next 12 months - and how the management of privileged access can be improved across the SAP estate, and beyond.
Earlier this year, we conducted a survey with more than 100 SAP customers worldwide, which explored views on the vulnerability of SAP systems to external threats and consequently revealed insights into several other elements of SAP security.
In this report, produced in conjunction with Onapsis, we summarise the findings of the survey, cover how complacency affects organisations' level of defence, and identify how SAP customers can protect themselves from external threats.
In this webinar, we provided an early look at the findings of our 2021 SAP Security Survey, run in conjunction with Onapsis. Specifically, our specialists covered why it's now vital that organisations look beyond roles and authorisations, and consider SAP security in the context of the wider cybersecurity landscape.
At this one-day virtual forum, we were joined by leading integrated risk management professionals from Siemens, SAP, and more.
You can now watch all the sessions on-demand, which explore how organisations can have a more agile, pragmatic, and integrated approach to risk, and effectively prepare for the emergence of UK/EU SOX.
Operational and enterprise risks present two very different types of threat to a business, and by managing them in separate silos, a consistent approach to risk management is not possible. In this guide, we'll highlight how to bridge the gap between these risks, and how to deploy a truly integrated approach to risk management.
The pharmaceutical industry is not immune to both the short and long term challenges which COVID-19 brings. This eBook is designed to help pharmaceutical companies evaluate their current risk management approaches, and consider what needs to be done to ensure that they thrive in these times of rapid change.
We recently surveyed over 100 senior SAP professionals to get their views on SAP security - more specifically, on their preparedness to implement security in their forthcoming S/4 HANA migrations.
The survey revealed several important findings that will provide invaluable insights for those about to embark on their S/4 HANA journey - or those already underway.
This very practical guide has been created to help SAP customers understand the new security considerations that come with implementing SAP S/4 HANA. We want you to side-step the mistakes of retrospective security work - so prevalent with past ERP projects. So, while there is still time to plan your migration, this guide will help you do so with security and compliance very much in mind.
Identity and Access Management (IAM) is a set of principles that, through the use of technology, ensures the right people, get the right access at the right time.
In this eBook we explore why this presents a risk to your organisation, in terms reduced productivity, financial losses, regulatory non-compliance and the threat of cyber attack - helping you build the case for SAP to be included in your next IAM project.
With Data Protection Day 2020 and Brexit both signifying landmark milestones for the GDPR, we wanted to revisit the regulation to see where SAP customers are in their journeys.
So, in our recent webinar we invited James Watson from SAP data specialist, EPI-USE Labs to share his experiences of working with SAP customers - and the best practices they have implemented to ensure compliance with the GDPR.
Many SAP customers are looking to unify their approach to risk management under a Governance, Risk and Compliance (GRC) strategy - designed to manage risk across the organisation, ensure compliance and align IT with business strategy.
But how can organisations begin this transformation? And what are the essential SAP tools required to carry it out? Download the guide to find out.
In the face of growing and evolving business risks, effective risk management is more essential than ever. It has become an almost mandatory part of global commerce (and indeed it is mandatory for UK businesses under the Companies Act 2006). Quite simply, if you’re not doing risk management properly, then your business is on shaky ground.
Underlying every SAP application is your SAP infrastructure - the silent and often-unseen support act that allows your application layer to run smoothly.
Today, this infrastructure is a complex web of operating systems, databases, network connections, servers and interfaces, all pushing and pulling data around your business. But while it’s critical to the seamless running of your organisation, it’s often overlooked from a security and risk perspective.
For IT leaders and those responsible for SAP applications, security has risen up the agenda. SAP environments are more complex than ever and increasingly vulnerable to external threats.
In this guest webinar, we are joined by Markus Schumacher, General Manager at Onapsis who explored the 5 main challenges CIOs and SAP security professionals face - along with his formula for success.
In this on-demand webinar, we look at how you can monitor and eliminate threats occurring within the SAP landscape using SAP Enterprise Threat Detection (ETD).
Turnkey’s own security expert, Tom Smith is joined by Paul Lloyd-Smith from SAP’s Office of the CFO to explore some simple use cases including alerting when an attacker creates a new user and managing alert investigations and exemptions.
In this 3-part series, we explore how organisations can reduce the risk of fraud using intelligent automation, how automating systems access greatly improves efficiency through the "joiner, mover leaver process" and how intelligent automation and monitoring can dramatically improve the management of high volume financial transactions.
In this webinar, Richard Hunt, Managing Director of Turnkey, will examine some key ways you can use SAP to meet your GDPR obligations Among other issues, he’ll explore how to use SAP’s Process and Access Controls to control & monitor access to personal data & conduct Privacy Impact Assessments, use self-assessment for GDPR activities such as evaluating product compliance and more.
Focusing specifically on SAP BusinessObjects, the webinar will cover how to ensure careful control of access to personal data, setting up detection and alerts for any data breach, identifying specific data for flagging and removal, archiving, backup, restore and disaster recovery strategies and more.
This thought-provoking session explores some fundamental questions. How do we consider risk in our personal and business decisions? How do we use technology and can we do more with it? Do we have controls that we don't even think about? Ultimately, it all comes down to how we can run our business better. Watch the webinar to find out more.
A series of critical vulnerabilities affecting the SAP Internet Communication Manager (ICM) component have been identified by Onapsis. The most severe vulnerability has a CVSSv3 score of 10 and could have a considerable impact on your organisation if exploited.
In this recorded webinar, we were joined by Onapsis to explore the impact this could have on your organisation, and the actions you need to take now to avoid any damage.