Least Privilege 2.0: Controlling Risk in a Dynamic Environment

A growing landscape of laptops and smartphones, widespread internet access, and remote workforces throughout the world have increased the need for risk and identity management and has changed how security models should operate. Continuing to focus on only two dimensions, the “Who” (users and user groups) and the “What” (roles and authorizations), leaves organizations vulnerable to new and emerging security threats. Today, businesses must consider a third dimension to user access risks: the “When.” How can companies better control the assignment of access rights related to tasks, rather than unilaterally granting privileges to users?

 In this session, join Appsian’s SAP Security experts as they discuss how SAP ERP customers can address and manage Least Privilege in today’s digital world, while explaining why access governance is critical to SAP security and how organizations can take steps to minimize their risk exposure.

 Attend this session to learn how to:

  • Strengthen Least Privilege by incorporating context into controls
  • Minimize risk exposure while enabling flexible, user-friendly access
  • Protect critical data and transactions in untrusted environments
  • Adapt to changing security and compliance requirements



MEET THE EXPERTS

Rajesh Rengarethinam Appsian Security
Read More

Rajesh Rengarethinam has over 23 years of experience building innovative SAP Products and Applications for large enterprise organizations. He has been responsible for driving technical strategy and architectural direction for various SAP certified products that have extended the SAP solution in the areas of GRC Access Control. Rajesh is an experienced SAP solutions architect with deep knowledge of SAP Application Security, Risk Management and Compliance.

Greg Wendt Appsian Security
Read More

Greg Wendt is one of the top ERP security experts with knowledge across multiple ERP platforms. During his 22-year career, he has been recognized as a leader in data security, application architecture and business operations.

EXPLORE BY TOPIC