by Greenlight Technologies | Oct 19, 2018 | Access Violation Management, Insider Threat
One employee can do a lot of damage. Just look at the headlines the other day from Microsoft. A grand jury indicted Microsoft’s former director of Sports Marketing and Alliances, Jeff Tran, for allegedly trying to create fake invoices for up to $1.4 million and...
by Greenlight Technologies | Aug 29, 2018 | Access Violation Management, Enterprise Solutions, Finance Performance and Risk Analytics, Risk Management
by Craig Abramson, Greenlight Technologies According to the Association of Certified Fraud Examiners’ Report to the Nations on Occupation Fraud and Abuse, “the most prominent organizational weakness that contributed to the frauds in our study was a lack of internal...
by Greenlight Technologies | Aug 8, 2017 | Access Violation Management
Hear from Jabil, a Fortune 200 global manufacturing services company, how they quantified and identified true Segregation of Duties. View this video to understand first hand about their selection process, implementation, lessons learned, and key successes they have...
by Greenlight Technologies | Jul 19, 2017 | Access Violation Management, Impact of Financial Risk
Instead of implementing and relying on manual processes to meet governance standards and objectives, you can arm your Audit, Compliance and Business teams with Greenlight to automate the process and eliminate the possibility of control failures. More importantly, you...
by Greenlight Technologies | May 4, 2017 | Access Violation Management
The buzz: “Choose what lies in the shadows to be a matter for discovery and adventure, rather than fear” (Jonathan Lockwood Hule). “The auditors noted” and “We discovered” are phrases feared by CFOs. Why? Failed audits detailed in your annual report can...
by Greenlight Technologies | Mar 15, 2017 | Access Violation Management
Webinar: Moving to SAP S/4HANA? Know the User Security Risks and Proactively Plan for Success Is your company planning to move to SAP S/4HANA? Managing known user risks both before the move and ensuring you are compliant after the move are critical to the success of...
by Greenlight Technologies | Mar 3, 2017 | Access Violation Management
On-demand Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions Is your business application landscape changing due to acquisitions or adoption of best of breed software applications? Planning your move to...
by Greenlight Technologies | Feb 20, 2017 | Access Violation Management
Heading to GRC2017? Don’t miss these sessions! Our close collaboration with SAPinsider this year has made it possible to extend a special registration discount off the on-site registration price: Register now and save $300 by clicking here. Don’t forget to...
by Greenlight Technologies | Feb 14, 2017 | Access Violation Management
Understand the Financial Exposure of Access Risks Managing the access that business users have to enterprise applications is a balancing act. Granting too much access leaves organizations exposed to higher risk, but granting too little prevents people from doing their...
by Greenlight Technologies | Feb 2, 2017 | Access Violation Management
SAPInsider: Are Your Financial Controls Ready for SAP S/4HANA? Identify Financial Risk Before Implementation As organizations are transforming their business with SAP S/4HANA, they’re reinventing business processes and eliminating redundancies to focus more on...
by Greenlight Technologies | Jan 31, 2017 | Access Violation Management
Uncover the Financial Exposure of Access Risks It’s a balancing act managing everyone’s access to your enterprise applications. Too much access leaves your company exposed to higher risk. Too little access keeps your people from doing their jobs efficiently. And...
by Greenlight Technologies | Jan 26, 2017 | Access Violation Management
Upcoming Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions Is your business application landscape changing due to acquisitions or adoption of best of breed software applications? Planning your move to...
by Greenlight Technologies | Jan 9, 2017 | Access Violation Management
Financial Controls Need to be Ready for the Speed and Power of SAP S/4HANA A certain level of access risk is unavoidable – to eradicate it all would limit business productivity. But in many cases, the controls that companies put into place to mitigate risk are...
by Greenlight Technologies | Jan 3, 2017 | Access Violation Management
Moving to S/4HANA? Why You Need to Automate Controls to Truly Transform Finance S/4HANA is transforming finance by introducing reinvented processes and real-time insight for higher performance and better decision making. But what many organizations fail to realize is...
by Greenlight Technologies | Dec 19, 2016 | Access Violation Management
View On-demand: How to Uncover Materialized Access Risks Before Your Move to S/4HANA S/4HANA is transforming finance by introducing reinvented processes and real-time insight for higher performance and better decision making. But are your financial controls ready for...