Greenlight Webinars (Archived)

Learn more about Greenlight's solutions by instantly viewing on-demand Webinar

On-demand Webinars

Are Authorized Devices Doing Bad Things to Your Business?

Cisco ISE helps you stop unauthorized devices from accessing the network, but do you know what damage authorized devices may be doing? Find out how you can also monitor user activity from authorized devices to stop data breaches. Join experts from Cisco and Greenlight for a special webinar to find out how you can gain complete visibility into the network traffic and business activity that puts your critical assets, infrastructure and data at risk.
Length: 45 Minutes
Watch Now

Ask the GRC Experts Q&A Session: Cloud Integration

When it comes to compliance, you know the drill. You have to have the right controls in place to ensure you comply with regulations such as SOX, HIPAA, and others. But as more and more of your systems move to the cloud, compliance becomes an impossible task. You’re not automating controls across these applications, such as Ariba, Workday, and Salesforce.com, and that’s going to lead to audit findings. Join us for this expert Q&A session on cloud integration where you help drive the agenda to get the answers you need.
Length: 30 Minutes
Watch Now

The Countdown to GDPR Webinar Series: Breaking Down the 72-hour Breach Notification Rule

You have all the right security measures in place but it still happened. You’ve been breached and the clock is ticking. You have 72 hours to report it to the supervisory authority as part of GDPR regulations or you risk receiving devastating fines – up to €20 million or 4% of global revenues, whichever is higher. In that 72 hours, you have to uncover what data was breached, how much was accessed, who may be affected by it, and how it happened. That’s no easy task but you can’t risk missing the deadline. And that’s why you need to view this Webinar. You will discover everything you need to know about GDPR’s 72 hour breach notification rule
Length: 30 Minutes
Watch Now

Making the Business Case: Uncovering the Value of Access Violation Management

How can you make your case for reducing manual mitigating controls for SoD and quantifying your financial exposure from access management risks? Greenlight commissioned top research firm Forrester to conduct a Total Economic Impact™ study to find out. Attend this webinar to hear what Forrester has to say.
Length: 45 Minutes
Watch Now

Moving to SAP S/4HANA? Know the User Security Risks and Proactively Plan for Success

Is your company planning to move to SAP S/4HANA? Managing known user risks both before the move and ensuring you are compliant after the move are critical to the success of the project. Join this informative Webinar to understand how to transform financial controls before and during the move to SAP S/4HANA.
Length: 30 Minutes
Watch Now

How to Upgrade RSA Archer to 100% Automation

RSA Archer gives you the ability to reduce business risk and improve your organization’s overall risk posture. But at the same time, it adds more manual compliance and testing procedures that take up a lot of your time, money and resources. Yet it only provides a point-in-time snapshot of your compliance efforts. You are left looking for a needle in a haystack that, if found, still leaves you lagging behind internal bad actors and malicious external threats. And we all know that compliance does not equal security. Running a periodic sample of IT security will at best tell you months later that an issue occurred. If this sounds familiar, then view our on-demand Webinar to learn how you can put RSA Archer on steroids and upgrade to 100% automation.
Length: 30 Minutes
Watch Now

Navigating MiFID II: How Leading Banking Organisations are Preparing with Confidence

Join us for this special Webinar to learn how to proactively manage regulatory compliance with MiFID II. You’ll also discover how leading banking organizations are effectively managing broad reaching regulatory change, assessing the business impact and mitigating compliance risk.
Length: 60 Minutes
Watch Now

How Jabil Effectively Achieves Compliance while Supporting Their Strategy of Growth thru Acquisitions

Is your business application landscape changing due to acquisitions or adoption of best of breed software applications? Planning your move to S/4HANA? Learn firsthand how Jabil Circuit achieves compliance despite their ever-changing environment. Hear how they reduced access violation data review by 95%, cut SoD risk by 50%, and moved to continuous controls monitoring while acquiring two companies.
Length: 45 Minutes
Watch Now

How Leading CISOs Are Tackling 2017 – LTM Research Enterprise Cybersecurity Survey Results

Find out how enterprise CISOs and executives of Information Security responded to these questions and more. Attend this special webinar that uncovers the results of LTM Research’s Enterprise Cybersecurity Survey to get a better idea of your peers’ concerns about internal and external threats, the impact a breach can have on an organization, and vulnerabilities due to underfunded security initiatives.
Length: 30 Minutes
Watch Now

How to Uncover Materialized Access Risks Before Your Move to S/4HANA

S/4HANA is transforming finance by introducing reinvented processes and real-time insight for higher performance and better decision making. But are your financial controls ready for S/4HANA? Are you prepared for your next audit? View this special webinar to find out how you can go-live with automated, exception-based controls from Day 1, minimizing your exposure of significant audit findings and having confidence that any issues are identified and resolved prior to your audit.
Length: 30 Minutes
Watch Now

How AXA Manages Access Risk in Ariba

AXA has implemented SAP ERP and Ariba to manage their invoicing and procurement process. As part of this transformation, they needed a solution to manage segregation of duties risks, automate user access controls and better manage their team’s workload. They tried to manage this manually, but the process was extremely time consuming and error prone. Hear how AXA implemented an automated process to proactively identify and remediate access risk violations, automate SoD and compensating control reviews, and improve the integrity of business transactions, provide operational transparency and ensure financial governance.
Length: 45 Minutes
Watch Now

Cyber Governance: Key Considerations for Navigating the New Normal

Gain the tools to navigate the new normal to managing cyber threats from the top down and learn how to compare your security program against leading security practices and controls.
Length: 45 Minutes
Watch Now

How to Get the Most Out of SAP Access Control

Find out how leveraging automation and the preventative capabilities of SAP Access Control across all of your business applications can maximize your cost savings and bring additional value to the business.
Length: 45 Minutes
Watch Now

Discover How Leading Companies Automate the Last Mile of Segregation of Duties

Learn how leading companies are quantifying financial exposure from SoD and extending SAP Access Control to monitor additional business applications.
Length: 45 Minutes
Watch Now

How Leading Banking Organizations Navigate Regulatory Changes with Confidence

Discover how to proactively manage regulatory compliance and satisfy new and changing demands from regulators. Then learn how leading banking organizations are effectively managing regulatory change, assessing the business impact and mitigating compliance risk.
Length: 45 Minutes
Watch Now

The Data Privacy Imperative in Health Care

Data privacy has been top of mind for health care organizations since the introduction of HIPAA but data security must also evolve. Learn about a holistic cyber governance strategy that will help you succeed in this new environment.
Length: 45 Minutes
Watch Now

Focus on Heineken – Simplifying Access Governance

Learn how Heineken has centralized their access governance program for SAP and non-SAP systems with solutions by SAP and Greenlight.
Length: 45 Minutes
Watch Now

Moving to Exception Based Monitoring and Quantifying Risk

Learn how Greenlight is simplifying SoD compliance with exception-based monitoring of actual SoD conflicts that occur during transaction processing, and quantifying financial exposure to show the real impact on your business.
Length: 45 Minutes
Watch Now

SoD Quantification: How to Prioritize Access Exposures Based on Financial Risk

Learn best practices for SoD risk quantification and how Access Violation Management by Greenlight can help your organization prioritize your control mitigation and security rendition efforts based upon the financial risk to your business.
Watch Now