Greenlight Webinars (Archived)

Learn more about Greenlight's solutions by instantly viewing on-demand Webinar

On-demand Webinars

Making the Business Case: Uncovering the Value of Access Violation Management

How can you make your case for reducing manual mitigating controls for SoD and quantifying your financial exposure from access management risks? Greenlight commissioned top research firm Forrester to conduct a Total Economic Impact™ study to find out. Attend this webinar to hear what Forrester has to say.
Length: 45 Minutes
Watch Now

Moving to SAP S/4HANA? Know the User Security Risks and Proactively Plan for Success

Is your company planning to move to SAP S/4HANA? Managing known user risks both before the move and ensuring you are compliant after the move are critical to the success of the project. Join this informative Webinar to understand how to transform financial controls before and during the move to SAP S/4HANA.
Length: 30 Minutes
Watch Now

Navigating MiFID II: How Leading Banking Organisations are Preparing with Confidence

Join us for this special Webinar to learn how to proactively manage regulatory compliance with MiFID II. You’ll also discover how leading banking organizations are effectively managing broad reaching regulatory change, assessing the business impact and mitigating compliance risk.
Length: 60 Minutes
Watch Now

How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions

Is your business application landscape changing due to acquisitions or adoption of best of breed software applications? Planning your move to S/4HANA? Learn firsthand how Jabil Circuit achieves compliance despite their ever-changing environment. Hear how they reduced access violation data review by 95%, cut SoD risk by 50%, and moved to continuous controls monitoring while acquiring two companies.
Length: 45 Minutes
Watch Now

How Leading CISOs Are Tackling 2017 – LTM Research Enterprise Cybersecurity Survey Results

Find out how enterprise CISOs and executives of Information Security responded to these questions and more. Attend this special webinar that uncovers the results of LTM Research’s Enterprise Cybersecurity Survey to get a better idea of your peers’ concerns about internal and external threats, the impact a breach can have on an organization, and vulnerabilities due to underfunded security initiatives.
Length: 30 Minutes
Watch Now

How to Uncover Materialized Access Risks Before Your Move to S/4HANA

S/4HANA is transforming finance by introducing reinvented processes and real-time insight for higher performance and better decision making. But are your financial controls ready for S/4HANA? Are you prepared for your next audit? View this special webinar to find out how you can go-live with automated, exception-based controls from Day 1, minimizing your exposure of significant audit findings and having confidence that any issues are identified and resolved prior to your audit.
Length: 30 Minutes
Watch Now

How AXA Manages Access Risk in Ariba

AXA has implemented SAP ERP and Ariba to manage their invoicing and procurement process. As part of this transformation, they needed a solution to manage segregation of duties risks, automate user access controls and better manage their team’s workload. They tried to manage this manually, but the process was extremely time consuming and error prone. Hear how AXA implemented an automated process to proactively identify and remediate access risk violations, automate SoD and compensating control reviews, and improve the integrity of business transactions, provide operational transparency and ensure financial governance.
Length: 45 Minutes
Watch Now

Cyber Governance: Key Considerations for Navigating the New Normal

Gain the tools to navigate the new normal to managing cyber threats from the top down and learn how to compare your security program against leading security practices and controls.
Length: 45 Minutes
Watch Now

How to Get the Most Out of SAP Access Control

Find out how leveraging automation and the preventative capabilities of SAP Access Control across all of your business applications can maximize your cost savings and bring additional value to the business.
Length: 45 Minutes
Watch Now

Discover How Leading Companies Automate the Last Mile of Segregation of Duties

Learn how leading companies are quantifying financial exposure from SoD and extending SAP Access Control to monitor additional business applications.
Length: 45 Minutes
Watch Now

How Leading Banking Organizations Navigate Regulatory Changes with Confidence

Discover how to proactively manage regulatory compliance and satisfy new and changing demands from regulators. Then learn how leading banking organizations are effectively managing regulatory change, assessing the business impact and mitigating compliance risk.
Length: 45 Minutes
Watch Now

The Data Privacy Imperative in Health Care

Data privacy has been top of mind for health care organizations since the introduction of HIPAA but data security must also evolve. Learn about a holistic cyber governance strategy that will help you succeed in this new environment.
Length: 45 Minutes
Watch Now

Focus on Heineken – Simplifying Access Governance

Learn how Heineken has centralized their access governance program for SAP and non-SAP systems with solutions by SAP and Greenlight.
Length: 45 Minutes
Watch Now

Moving to Exception Based Monitoring and Quantifying Risk

Learn how Greenlight is simplifying SoD compliance with exception-based monitoring of actual SoD conflicts that occur during transaction processing, and quantifying financial exposure to show the real impact on your business.
Length: 45 Minutes
Watch Now

SoD Quantification: How to Prioritize Access Exposures Based on Financial Risk

Learn best practices for SoD risk quantification and how Access Violation Management by Greenlight can help your organization prioritize your control mitigation and security rendition efforts based upon the financial risk to your business.
Watch Now