SAP Authorizations are the elephant in the room when dealing with SAP security. But reality and demands can differ: while you want to restrict access as much as you can, sometimes that is not possible. It can happen for example that a user can create or change a vendor and enter invoices or change SAP authorization roles and assign roles to users..
So how do you mitigate residual access risks? We’ll be happy to tell you! In this webinar we will discuss how you can detect users executing a “risky” action, such as changing certain data, or violating a Segregation of Duties rule.
We will talk about:
Jens has 20+ years experience in SAP security, compliance and internal controls. He is an ex-auditor, always curious, willing to learn and to share knowledge. At VOQUZ Labs Jens is responsible for our risk and compliance products. He enjoys interacting with customers and finding quick and simple ways to improve our products to deliver value to customers. Pragmatic and customer-focused? Then Jens :)
Anyone in search of an Analyst Programmer with a deep-seated expertise in SAP ABAP, Nicolas stands out with over 14 years of direct experience in both custom development and standard enhancements. His skill set extends to CDS development in SAP S/4HANA and solving high-complexity problems related to performance tuning, and architectural design among others. Nicolas's comprehensive command of ABAP is matched by his proficiency in Performance tuning, Object-oriented programming, and an array of interface technologies. For a blend of seasoned insight and refined technical acumen, look no further than Nicolas.