Let's Talk Data Security

31 December 1970

Navigating data privacy in Saudi Arabia: A path to complianc...

In a move towards comprehensive data protection, the Kingdom of Saudi Arabia (KSA) has int...

Nine essential steps for data privacy compliance in SAP

SAP is one of the most robust systems in the world, but also one of the most complex, and ...

Guardians of the wild: SAP data privacy lessons from nature

In this blog, I explore parallels between the survival of the fittest in both nature and t...

Future-proof your governance and risk in SAP

If you are moving your SAP system to the cloud, managing Access Risk should be top priorit...

Why SAP data consistency and anonymisation is not a clear-cu...

Data privacy is a topic that gets a lot of focus and organisations need to consider how to...

SAP User Access Reviews: Six best practices

The majority of components making up a Governance, Risk and Compliance (GRC) solution are ...

The GDPR journey of a data process

In the last blog in this series, I discussed the merits of redacting sensitive or identify...

How do I prepare my SAP environment for UK SOX?

Just as the 2001 Enron scandal led to the enactment of the Sarbanes-Oxley (SOX) legislatio...

The changing face of data privacy attitudes in Australia

With Australian Privacy Awareness Week taking place in May 2021, now feels like a good tim...

Why delete when you can redact?

In the previous blog in this series, I talked about how consumers expect a company to hand...

Data Protection Day: Secure your SAP without compromises

Today is Data Protection Day! A day dedicated to raising awareness and the importance of d...

Do you have a Black Friday data hangover?

The rise in online shopping reaches a crescendo If anything can be said to have thrived in...

Explore Popular Tags

GDPR Data Privacy Data Security Data Secure GDPR compliance Data Redaction data scrambling Data Redact General Data Protection Regulation POPI Act POPIA SAP Data Security SAP GDPR SAP data privacy and compliance Data Archiving Data Sync Manager Data privacy regulations Right to be forgotten Data privacy compliance GDPR readiness GDPR deadline Personal data SAP SAP security SAP systems GRC for SAP SAP data privacy and security Access Risk management Access risk controls Data Privacy suite Data minimisation Data security breaches Governance, Risk Management and Compliance (GRC) compliance COVID-19 Data privacy by design Risk monitoring SAP data copying and masking SAR Soterion Subject Access Request anonymised data Australian Privacy Act 1988 CCPA Cenoti Client Sync Data Protection Day Data masking EPI-USE Labs’ solutions European operations Federal Law GDPR fine Guest order ICO May 2018 Object Sync One-time customer Privacy by Design Reducing risk Right to Erasure Risk minimisation S/4HANA Migrations SAP S/4HANA SAP data SAP data privacy & security Secure scrambled production data for testing Test Data Management security breach Backlog privacy debt Black Friday Black Friday hangover Black Friday sales Breach Notification Brexit Budget Canada data privacy legislation Cenoti, connecting SAP with Splunk Cloud migrations Confidentiality Consent DSM DSM Readiness Assessment Data Diclose Data Portability Data Removal Data Replication Data Sync Manager (DSM) Data integrity Data privacy assessment Data processor versus controller Data retention rules Documentation Employee data Europe Friday 25 May 2018 GDPR-type legislation GRC GRC for SAP tools General Data Protection HCM HR ILM Information Commissioner’s Office Information transfer Infotype 41 JSOX New Zealand Privacy Act News Online shopping Penalties Personal Data Protection Law (PDPL) Phantom Proportional Data Protect personal employee data Removing data in SAP Right to Access Rise with SAP Risk management S4HANA SAP Cloud SAP Data Privacy Suite SAP RISE SAP SuccessFactors SAP access risk simulations SAP data encryption SIEM SOX Sarbanes-Oxley (SOX) legislation Saudi Arabia Security Security Information and Event Management Security for SAP. Live Sensitive HCM data South African data privacy legislation Splunk Splunk UBA Splunk’s Enterprise Security Success Factors Territorial Scope UK Government User Access Review Virtual conference What does the European GDPR mean for Australia? ebook masking rules quality of test data system copy uk sox
+ See More

Get Instant Updates


Leave a Comment: