Event Presentations

Our Conference Presentation Library contains hundreds of SAPinsider event presentations, putting the insights and guidance of SAP experts and professional speakers at your fingertips. Flip through thousands of slides to obtain first-hand knowledge of the actionable content delivered at SAPinsider’s annual events.

944 results

  1. Transform Better: Top Trends and Tales of Real-World Digital Transformation

    Click Here to View the Session Deck. In this session, we’ll look at some of the top trends in digital business transformation, including preparing for the Generative AI future; opportunities for more automated automation; and how to accelerate innovation by unleashing the power of businesspeople to do more transformation themselves. You will: Walk through real-world…...…

  2. Effectively Use Internal Orders to Accelerate Your Financial Processes

    Click Here to View the Session Deck. In this session, you will learn the basics of internal orders. These high flexible tools within CO are often ignored by consultants and users alike as they appear esoteric. Once you learn the basics, they offer broad functionality for planning, budgeting, cost and revenue analysis. You will also…...…

  3. The Guide for the Perplexed: The Different Sourcing and Purchasing Tools in SAP S/4HANA

    Click Here to View the Session Deck. SAP S/4HANA has multiple sourcing and procurement tools and each may be suitable for different business situations. Do not miss this opportunity to discuss the different tools (SAP Ariba, SAP SRM, SAP Sourcing, SAP ERP Outline Agreement, SAP ERP Purchasing) and their best-fit business situations, so that they…...…

  4. 30 Training and Empowerment Tips for Users Who Rely on SAP Financial Applications

    Click Here to View the Session Deck. This back-to-basics session identifies the most important areas to address when training all end users on SAP functionality, including analysis, display, environment, and reporting. Take home 30 tips that will accelerate the end-user learning curve and reduce calls to the help desk. You will: • Help users get…...…

  5. DevSecOps, SecDevOps, and Secure Cloud Transformation: Accountability Through Cloud Security Engineering

    Click Here to View Session Deck. As a cloud services provider, it is more important than ever to secure the software and services SAP provides. It is most efficient to manage this in the development cycle as much as possible through a DevSecOps approach that includes security controls every step of the way. However, we…...…

  6. Case Study: Managing Access Governance and Security Using SAP GRC in a Highly Regulated Industry

    Click Here to View the Session Deck. In the pharmaceutical industry, where strict regulations and data security are paramount, integrating user provisioning and risk control with SAP IDM (Identity Management) and SAP GRC (Governance, Risk, and Compliance) Access Control offers significant advantages. This integration ensures a streamlined and robust system that not only meets regulatory…...…

  7. Harnessing the Power: Maximizing IAM Efficiency with SAP Cloud IAG

    Click Here to View the Session Deck. This session will provide a robust exploration of how SAP Cloud Identity Access Governance (SAP Cloud IAG) empowers businesses to conquer these challenges head-on. Within this session’s framework, we will delve into the capabilities of SAP Cloud IAG as a potent service from the SAP Business Technology Platform…...…

  8. Case Study: Enhanced Efficiency and Clearer Insights – Serrala’s Impact on BRF’s Payments Processing and AR

    Click Here to View the Session Deck. BRF, a global consumer goods company operating in 117 countries, faced challenges with manual and time-consuming payment processes that caused errors and delays, impacting cash flow and payment tracking. To address these issues, BRF partnered with Serrala, implementing a comprehensive financial solution consisting of payments automation, connectivity handling,…...…

  9. SAP Security in Hybrid System Landscapes

    Click Here to View Session Deck. The implementation of a holistic security architecture is becoming indispensable in the age of cybersecurity and the rapid increase of new applications. The use of cloud-based applications is creating hybrid landscapes that present many customers with new challenges. Not only do cloud solutions need to be secured and documented,…...…

  10. How to identify suspicious activities with SAP Enterprise Threat Detection

    Click Here to View Session Deck. Designed to provide a hands-on understanding of SAP Enterprise Threat Detection (ETD), this session, led by a team of SAP ETD specialists will learn to effectively identify suspicious activities in SAP S/4HANA and implement proactive mitigation strategies to prevent data breaches. The session will equip attendees with the skills…...…