Compliance - How Roles And Authorizations Impact Gdpr And Grc

This session shows how Security Event Management and – Monitoring is set up and implemented in practice. Furthermore, it covers topics such as:

- Dealing with Big Data
- Setup and implementation of security relevant processes
- Attack vectors and how they can be analyzed

This content is available to SAPinsiders. Please click to create an account or log in.

Login Create An Account