cabramson@greenlightcorp.com

/Greenlight Technologies
­
cabramson@greenlightcorp.com'

About Greenlight Technologies

This author has not yet filled in any details.
So far Greenlight Technologies has created 90 blog entries.

Webinar: Moving to SAP S/4HANA? Know the User Security Risks and Proactively Plan for Success

By |March 15th, 2017|Access Violation Management|

Webinar: Moving to SAP S/4HANA? Know the User Security Risks and Proactively Plan for Success Is your company planning to move to SAP S/4HANA? Managing known user risks both before the move and ensuring you are compliant after the move are critical to the success of the project. During this time of transformation, it’s important [...]

Comments Off on Webinar: Moving to SAP S/4HANA? Know the User Security Risks and Proactively Plan for Success

Top 5 Cybersecurity Breaches in February

By |March 7th, 2017|Cyber Governance|

Top 5 Cybersecurity Breaches in February Whether it’s due to malware being found on payment devices or spoofed emails that lead to a data breach, companies are losing the battle to protect their crown jewel assets. It’s easy money to these hackers once they gain access to this information so they’ll continue to find new [...]

Comments Off on Top 5 Cybersecurity Breaches in February

On-demand Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions

By |March 3rd, 2017|Access Violation Management|

On-demand Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions Is your business application landscape changing due to acquisitions or adoption of best of breed software applications? Planning your move to S/4HANA? View this special on-demand webinar to learn firsthand how Jabil Circuit achieves compliance despite their ever-changing environment. Hear [...]

Comments Off on On-demand Webinar: How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions

Why the CFO Is Just as Responsible for Cybersecurity as the CISO

By |February 28th, 2017|Cyber Governance|

Why the CFO Is Just as Responsible for Cybersecurity as the CISO A recent survey conducted by LTM Research targeting 2000 enterprise CISOs found that 59% of the respondents indicated that it is difficult to receive funding for security initiatives. And 70% of them are concerned about undetected breaches. So the CISO is charged with [...]

Comments Off on Why the CFO Is Just as Responsible for Cybersecurity as the CISO

Heading to GRC2017? Don’t miss these sessions!

By |February 20th, 2017|Access Violation Management|

Heading to GRC2017? Don't miss these sessions! Our close collaboration with SAPinsider this year has made it possible to extend a special registration discount off the on-site registration price: Register now and save $300 by clicking here. Don't forget to join us for these special sessions during the event: Panel discussion: Customers of SAP Access [...]

Comments Off on Heading to GRC2017? Don’t miss these sessions!

How Much Did the Verizon Breach Cost?

By |February 16th, 2017|Cyber Governance|

How Much Did the Verizon Breach Cost? As Verizon was in the process of closing the $4.83 billion deal to acquire Yahoo, news hit about the largest data breach ever. Rumors were swirling that Verizon may pull out of the deal but now comes word that they have agreed to a price cut of $250 [...]

Comments Off on How Much Did the Verizon Breach Cost?

Understand the Financial Exposure of Access Risks

By |February 14th, 2017|Access Violation Management|

Understand the Financial Exposure of Access Risks Managing the access that business users have to enterprise applications is a balancing act. Granting too much access leaves organizations exposed to higher risk, but granting too little prevents people from doing their jobs and slows business momentum. Organizations need insight into the financial impacts of access risk [...]

Comments Off on Understand the Financial Exposure of Access Risks

Top 5 Cybersecurity Breaches in January

By |February 9th, 2017|Cyber Governance|

Top 5 Cybersecurity Breaches in January Despite all of the security steps companies are taking, hackers are still finding their way in to an organization’s crown jewel assets. Here are the top 5 breaches reported in January. U.S. Cellular: This breach hasn’t been verified but it has been reported that a hacker is selling a [...]

Comments Off on Top 5 Cybersecurity Breaches in January

On-demand Webinar: How Leading CISOs Are Tackling 2017 – LTM Research Enterprise Cybersecurity Survey Results

By |February 6th, 2017|Cyber Governance|

On-demand Webinar: How Leading CISOs Are Tackling 2017 - LTM Research Enterprise Cybersecurity Survey Results Should you be more concerned about internal threats? How often are systems breached? Do you need to be more focused on protecting your crown jewel assets? What impact does a breach have on an organization? Are you vulnerable due to [...]

Comments Off on On-demand Webinar: How Leading CISOs Are Tackling 2017 – LTM Research Enterprise Cybersecurity Survey Results

SAPInsider: Are Your Financial Controls Ready for SAP S/4HANA? Identify Financial Risk Before Implementation

By |February 2nd, 2017|Access Violation Management|

SAPInsider: Are Your Financial Controls Ready for SAP S/4HANA? Identify Financial Risk Before Implementation As organizations are transforming their business with SAP S/4HANA, they’re reinventing business processes and eliminating redundancies to focus more on exceptions and critical tasks, ultimately resulting in better decision making. But a key consideration must be the impact on financial controls [...]

Comments Off on SAPInsider: Are Your Financial Controls Ready for SAP S/4HANA? Identify Financial Risk Before Implementation