Live Webinars

Register for upcoming Webinars to learn more about Greenlight's solutions


How to Avoid Material Weaknesses or Significant Deficiencies in Your Audit Reports

A startling number of public companies reported material weaknesses in the previous quarter. In fact, 23% of the 5,600+ filings reported one based on the aggregated ICFR Tracker information we provide to Financial Executives International (FEI) on a quarterly basis. And 75% of the companies reporting material weaknesses last year were because of controls not being properly monitored according to the State of SOX/Internal Controls Market Survey result highlights.

Join us for this critical Webinar to find out:

  • Material weakness trends over time
  • Key issues that companies face and best practices to help with your reporting efforts
  • How an effective system of ICFR can significantly reduce the risk of misstatements and inaccuracies in your company’s financial statements

Wednesday, August 21st
1:00PM-2:00PM ET
Click here to learn more and to register.

Extend Your Compliance Programs to SAP Ariba

If you’re not adequately evaluating SAP Ariba for business risk such as segregation of duties, and utilizing automated provisioning, odds are you’ll end up with a significant audit finding. Worse yet, you’re putting your supply chain at risk.

Join GRC expert Susan Stapleton to discover how you can seamlessly integrate SAP Ariba (and other cloud solutions) into your user access management process, including automated mitigation of risks.

Attend this 30 minute webinar to learn how you can:

  • Gain visibility and reduce risk exposure by automating your control data in real-time online
  • Ensure you do not fail access audits due to ineffective controls
  • Facilitate business ownership of user risks by providing exception-based reporting
  • Ease the burden of audits and periodic controls on the business by as much as 95%

Thursday, August 22nd
1:00PM-1:30PM ET
Click here to learn more and to register.

Introduction to Privileged Access Management and Firefighting for SuccessFactors

Can you prevent authorized users from performing unauthorized activities in SAP SuccessFactors? Find out how by attending this quick demo of Greenlight’s Privileged Access Management and Firefighting solution.

You’ll find out how you can:

  • Monitor all user activities and gain a complete audit trail of all change actions within the application
  • Enable, automate, monitor and audit emergency & super-user access
  • Prevent audit-trail manipulation

Tuesday, August 27th
1:00PM-1:30PM ET
Click here to learn more and to register.

Activity and Transaction Monitoring for Internal Controls Demo

How do you monitor 100% of your transactions across the enterprise to automatically uncover the exceptions and prevent risky or fraudulent transactions? For example, can you detect internal control violations in your cloud and on-premise applications in real time? Are you able to see 100% of the issues in your business process controls, segregation of duties and IT general controls? Attend this brief overview demo of Greenlight’s Activity and Transaction Monitoring capabilities for internal controls to find out how you can achieve this.

You’ll also learn how to:

  • Move to exception-based monitoring for actual internal control failures that occur during transaction processing
  • Alert on risk and compliance issues as they occur
  • Automated IT General Controls
  • Minimize issues from fraud, error or omission

Tuesday, September 10th
1:00PM-1:30PM ET
Click here to learn more and to register.

Don’t Let Business or IT Transformation Leave Your GRC and Internal Controls Behind

Demonstrating compliance with SOX, data privacy requirements, and segregation of duties will become more complicated as your enterprise landscape continues to evolve. This is because existing controls can’t keep up with the pace of innovation as companies turn to best-of-breed, cloud-based solutions such as SuccessFactors, Workday, Kronos, Ariba, Coupa, Dynamics,, and many others. Since these solutions have to be implemented quickly, compliance takes a back seat to business growth. And the only time it will become a priority again is when there’s an audit finding.

Join Governance, Risk and Compliance experts James Rice and Juliet Henry for an interactive presentation on how you can easily and cost-effectively overcome these challenges.

In this webinar you’ll learn how to:

  • Standardize user access controls across all applications
  • Unify compliance and risk detection of all cloud, hosted, and on-premise systems under one solution
  • Minimize the impact of compliance on the business
  • Significantly reduce the cost of SOX and regulatory compliance
  • Identify access violations that could cause misstatements and/or inaccuracies in your company’s financial statement

Wednesday, September 11th
1:00PM-2:00PM ET
Click here to learn more and to register.

10 Steps to Prevent the Insider Threat from Wreaking Havoc on Your Applications

According to a recent Ponemon Institute study, the total average cost of an inside breach is $8.76 million.

Worse yet, the inside threat continues to grow at companies like Greenlight Technologies with various reports showing the insider is responsible for anywhere between 60% and 80% of breaches.

Take action Craig and watch this 30 minute Webinar to quickly see the ten steps you need to take to protect your business-critical applications!

You’ll also learn how to:

  • Ensure business application users don’t commit fraud or jeopardize sensitive data
  • Strengthen compliance and reduce access risks
  • Prevent audit trail manipulation to stop the insider from covering their tracks

Tuesday, September 17th
1:00PM-1:30PM ET
Click here to learn more and to register.

New Tools & Techniques to Make Your S/4HANA Journey Compliant and Secure

As organizations embark on their S/4HANA journey, they need to consider which tools and techniques to leverage in order to ensure secure implementations and on-going compliance management and monitoring. In this joint webinar with Protiviti and Greenlight, we will discuss:

  • How workstreams and processes need to be supported during an implementation
  • What inherent technology is available within systems and new tools to assist with risk management
  • The application of automated tools with real customer case studies

Tuesday, September 24th
2:00PM-3:00PM ET
Click here to learn more and to register.

Click here to view our on-demand Webinars