Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog December 17, 2021 Establishing an Omnichannel Data Management Process Using SAP Information Steward SAP Information Steward is a web-based application that provides users with centralized environment to analyze, assess, categorize, monitor and improve the enterprise data quality. This tool consists of five core functionalities: data insight, metadata management, cleansing package builder and match review. In this article, we will go over the basic functionalities of each area, followed by our… Blog January 4, 2022 Preparing For a More Protected Union The United States federal government has been acting to strengthen its cyber defenses. The actions taken and planned will not only impose new compliance obligations on governmental bodies, but also on private sector technology and service providers that deal with the government — and for businesses that support these providers. Recently, we hosted a webinar entitled To Form a More Protected Union… Blog January 10, 2022 Don’t Let Technical Debt and Other Cybersecurity Risks Drag on M&A Do your homework. The age-old mandate has newfound relevance for CISOs, given the intense pace of mergers and acquisitions (M&A) and escalating cybersecurity risks. Global business consolidation activity is strong. The number of deals (and the combined value of those transactions) through the first three quarters of 2021 surpassed the number of deals (and the combined value of those… Blog January 12, 2022 What You Read Most: Top Five SAP Insights From 2021 As we move ahead into the new year, here are Protiviti’s most popular SAP insights from 2021. Our subject matter experts addressed many pressing issues, and the topics covered promise to remain important throughout 2022. The top five most-read pieces are listed below. #1. Common Pitfalls of ERP Implementations: A… Blog January 18, 2022 Becoming a CISO: If I Knew Then What I Know Now Throughout my career as both a CISO and a consultant serving CISOs in companies around the globe, I’ve learned that Chief Information Security Officers, regardless of their current title, reporting structure or how they got to the role, share many things in common; one of which being, they love to talk about their experiences. Recently, we gathered three of the most experienced CISOs I know to… Blog January 19, 2022 Get “Fancy” With Unlimited SAP GRC Reporting Integration of SAP SAC and other third-party reporting capabilities Based on our experience gained during many SAP governance, risk and compliance (GRC) implementations over recent years, we know that clients are always looking for more flexibility and visualizations to meet their internal reporting requirements. While SAP GRC provides comprehensive reports, these are table-based with limited… Blog January 26, 2022 Looking Forward: SBOM to Improve Responsiveness For the Next Log4Shell What is Log4Shell? On December 10, 2021, a vulnerability known as Log4Shell (CVE-2021-44228) was disclosed, related to a popular Java logging library (log4j). Log4Shell gained a lot of attention due to how simple it is to exploit, how pervasive Log4j is, and the potential level of access it can provide. Within a few days of being released, many companies discovered vulnerabilities in their… Blog January 31, 2022 CISOs and Year Two of the Pandemic – How Did We Adapt and What Still Must Change? In December 2021, in my role as president of the ISSA Delaware Valley Chapter, I had the honor of hosting a panel with five Chief Information Security Officers (CISOs), representing five different industries, each facing unique challenges presented by the global COVID-19 pandemic. The panelists included: Robert Younce - CISO of Mannington Mills, one of the world's leading manufacturers of fine… Blog February 8, 2022 Vulnerability Management: We’ve Been Doing It All Wrong Vulnerability management is a discipline that many organizations struggle with due to one simple factor: complexity. Today, organizations manage environments with technology that changes at an ever-increasing speed while relying upon legacy systems to support key business processes. In response to this complexity challenge, cybersecurity professionals continue to create new vulnerability… Blog February 9, 2022 Making a Good Thing Better: Migrate SAP BusinessObjects Platform to the Cloud SAP Business Objects, often referred to within the SAP ecosystem as BOBJ, is one of the most evolved and reliable analytics and reporting engines running today. With over 60,000 BOBJ installations, the solution can be found in companies of all sizes in every industry around the world. Founded in 1990 and acquired by SAP in 2007, Business Objects is still primarily located in on-premise servers… Load More