In this session, learn how medical device company Stryker implemented SAP and fully integrated an optimized controls integration workstream from project inception. Hear how the workstream achieved leading practice automation during the design and build of the global template, and how Stryker is able to manage security and controls from its newly created Internal Controls Center of Excellence, leveraging access control and process control from SoDs to manual control performance (MCP).
Attendees of this session will...More »
In this session, you will be presented with specific workflows, methodologies, and strategies to deliver system refreshes with lightning speed. The foundation is a standardized, consistent, and highly optimized workflow. All steps are then fully automated and largely executed in parallel. Cloud techniques reduce full refreshes to hours from days; these include snapshots for database copies or temporarily moving the system to faster disks or a larger machine during execution of the refresh. Finally, an integrated data masking phase fully obfuscates sensitive data after the refresh. Attend to review...More »
Attend this session to hear how Newport News Shipbuilding — the sole designer, builder, and refueler of U.S. Navy aircraft carriers and one of two providers of U.S. Navy submarines — successfully integrated its SAP SuccessFactors and SAP ERP ecosystem. Understand the key steps and critical security requirements taken by the company to evolve its SAP ERP HCM functionality to SAP SuccessFactors while keeping payroll and time management on premise in SAP ERP. Join to...
Join this session to see how the PA State System of Higher Education’s (PASSHE) human resources SAP support team has developed several new “flavors” (screens) designed to improve adoption and reduce training costs for their SAP on-premise end users. Understand how SAP Screen Personas can improve user productivity by personalizing common SAP GUI screens to improve usability and visual appeal. Attend this session to...More »
This session shows you how Coke One North America (CONA) Services uses SAP Fiori and SAPUI5 to create a great user experience for its North American Coca-Cola bottlers. Learn how many on-the-go Coca-Cola bottler associates access employee self-service (ESS) and manager self-service (MSS) through mobile devices. Attend to...More »
Join us to get insights into the foundation and baseline of the risk management lifecycle at SAP, starting with the risk identification up to external risk publishing in 20F and annual report. In this session, you will learn...More »
Attend this session to learn how Lockheed Martin, an American global aerospace, defense, security and advanced technologies company, evolved its access management strategy and improved its overall risk posture through the implementation of common processes, technology, and governance. Attend this session to ...More »
Explore the journey undertaken by UGI Utilities to leverage SAP Access Control 10.1 to achieve an enterprise-wide security model for SAP and non-SAP applications. Attend this session to understand some of the challenges of discretionary access control security design and the compliance and operational efficiencies that an organization can benefit from by migrating to an enterprise-wide role- based access control security model. Attend this session to ...More »
Newport News Shipbuilding has been running SAP ECC since the late 1990s in an environment with over 4,000 roles and 8,000 users. Learn how they incorporated SAP Access Control and enhanced the user access review (UAR) process to establish a complete and accurate review of user to role assignments. Attend this session to ...More »
Dave Wood, The Goodyear Tire & Rubber Company
Learn how The Goodyear Tire & Rubber Company utilizes multiple rulesets to validate ruleset changes in production without impacting the global ruleset. Take a deep dive and see how the company maintains a second simulation ruleset to perform risk analysis against production users and review how Goodyear uses Multi Step Multi Process to pass all access control requests with a risk to a different path, allowing role owners to approve requests despite risks. Finally, see how Goodyear tracks the progress of mitigation requests utilizing GRC tables. Attend this session to ...More »