- ebooks & Articles
- Case studies
- video case studies
The aim of this ebook is to present an overview of the current challenges and compliance requirements associated with securing and monitoring access to critical systems and data sets.
Mitigate risk with spreadsheet controls
Mitigate risk with spreadsheet controls. Best practices and easy-to-use-techniques to simplify and streamline the complexity of managing large spreadsheets.
How to Reduce Errors in Application Maintenance and Upgrades
Learn to utilize best practices, proven techniques and change management methods to capture control design, create control configuration files and deploy controls within and across ERP instances.
Learn ERP Security and Controls Testing in Oracle EBS R12
Learn how to create test plans that include ERP security and controls testing in Oracle E-Business Suite R12 as well as common security model controls and configuration defects.
Prevent risk in Procure to Pay
Measuring the ROI of internal control automation
Tips for an effective internal controls testing program
Solving the high costs of SOX compliance
IT Application Controls and the benefits of automation
The impact of M&A on software and the customer
Everything you need to know about ITGC SOX
Examples of custom roles in Oracle ERP Cloud
Why you should customize roles for Oracle ERP
Getting access certification right
The policy-based identity governance guidebook
Governance and Controls in Higher Education
Buy vs Build an Audit Solution – Factors to consider
Data Integrity for effective audit
Cyber Security and Segregation of Duties
IT security and segregation of duties
Moving to Oracle ERP Cloud?
The truth about Segregation of Duties assessments
Insider Threats and how to prevent them
Multi-cloud Security and Governance Challenges
Risk Management in Cloud ERP Transformation
Why security and controls in ERP implementations
Reduce Cloud ERP Risks with Configuration Monitoring
Top 5 strategies SoD Oracle ERP Cloud
Control Siloed User Access Management
Access Control Capabilities and options
Why you need policy-based Identity Governance
Taking a risk-based approach to access management
Top Challenges with Identity Access Management
Inefficiencies in User Access Request Management
Best Practices Access Certification
Converged IAM – identity security in the cloud
SOX preparation for pre-IPO
The Benefits of Automated Controls
Why Automate Internal Controls?
How to streamline fragmented user access management
The benefits of Continuous Controls Monitoring
Page [tcb_pagination_current_page] of [tcb_pagination_total_pages]