Kehinde Eseyin

Meet the Expert

Kehinde Eseyin

Kehinde Eseyin is a security architect. He holds a bachelor’s degree in computer science. He has about 12 years of IT security, governance framework, IS risk, and compliance experience gained by working in numerous global organizations. Over the years, he has demonstrated competencies in security design, information assurance, cyber security, data privacy, threat and vulnerability management, penetration testing, business architecture, project management, IT audit, IS controls framework, and identity and access management.


Explore all posts by Kehinde Eseyin

  • Quickly Resolve SAP HANA Authorization Errors and Issues

    By Kehinde Eseyin

  • Seamlessly Activate and Deploy SAP Fiori 1.0 for SAP Solutions for GRC

    By Kehinde Eseyin

  • Better Manage Enterprise Risk and Streamline Audit Lifecycle Management with SAP Audit Management(Part 2)

    By Kehinde Eseyin

  • Better Manage Enterprise Risk and Streamline Audit Lifecycle Management with SAP Audit Management (Part 2)

    By Kehinde Eseyin

  • Better Manage Enterprise Risk and Streamline Audit Life Cycle Management with SAP Audit Management (Part 1)

    By Kehinde Eseyin

  • Better Manage Enterprise Risk and Streamline Audit Lifecycle Management with SAP Audit Management (Part 1)

    By Kehinde Eseyin

  • Drive Risk-Based Auditing in the SAP Audit Management System

    By Kehinde Eseyin

  • How to Configure SAP Enterprise Threat Detection for Increased Surveillance and Real-Time Analysis of Security Threats

    By Kehinde Eseyin

  • SAP Access Control Implementation: The Myth, Truth, and Tricks (Part 2)

    By Kehinde Eseyin

  • SAP Access Control Implementation: The Myths, Truths, and Tricks (Part 2)

    By Kehinde Eseyin

  • SAP Access Control Implementation: The Myth, Truth, and Tricks (Part 1)

    By Kehinde Eseyin

  • SAP Access Control Implementation: The Myths, Truths, and Tricks (Part 1)

    By Kehinde Eseyin

  • Detect and Prevent Malicious Business Transactions with SAP Fraud Management

    By Kehinde Eseyin

  • Prevent Data Disaster in Your SAP HANA System Landscape With Effective Backup and Restore Strategies

    By Kehinde Eseyin

  • A Guide to Passing an SAP HANA System Security Audit

    By Kehinde Eseyin

  • Technical Audit Scoping of an SAP HANA System: The Comprehensive Audit Questionnaire

    By Kehinde Eseyin

  • Harness Risk Threshold Definition to Drive Ad Hoc Risk Escalation

    By Kehinde Eseyin

  • How to Set Up SAP Supplier Lifecycle Management Business Scenario Capabilities

    By Kehinde Eseyin

  • Enhance the Compliance Process and Regulatory Reporting in Your Organization with Disclosure Survey

    By Kehinde Eseyin

  • Perform Risk Analysis Using a Point-Based Scoring Method for Probability and Impact

    By Kehinde Eseyin

  • Get Your SAP System Landscape Technically Ready for SAP Assurance and Compliance

    By Kehinde Eseyin

  • How to Simplify the Data Sources and Business Rules Logistics Process in SAP Process Control 10.1

    By Kehinde Eseyin

  • Enhance User Access Risk Reporting in SAP Access Control 10.1 with User Master Data Attributes

    By Kehinde Eseyin

  • 2 Ways to Control Making Changes to ABAP Web Dynpro Personalization Settings

    By Kehinde Eseyin

  • How to Prepare for a Comprehensive System Audit and Technical Review of SAP Access Control 10.0

    By Kehinde Eseyin