Seven Key Factors to a Successful PMO Transformation

Established enterprises and rapidly growing firms continue to adapt to changing business environments driven by competition, acquisitions, emerging technologies and new risks. The same changes that are...

Upgrading to SAP GRC 12: Down to the Wire

We are just weeks away from the SAP GRC application reaching the end of its mainstream maintenance on December 31 of this year (see illustration below).  Organizations who are running Access Control, Process...

Governing SAP Applications with Cloud Identity Access Governance

Previously, we wrote about Cloud Identity Access Governance (IAG) based on the latest news coming out of a recent SAPinsider event. In this post, we would like to provide an update on the solution and clarify...

As Organizations Transform, the Role of the Project Manager Is Changing

Project management as a function is undergoing rapid and profound transformation, and organizations are reconsidering the value project managers (PMs) can bring to their programs and projects. Over the course...

Penetration Testers Tool Kit: A Transition from PowerShell to C#

Attackers are continuously evolving their tool sets to keep ahead of defenders. In this blog, we highlight and discuss one major transition occurring in the attack and penetration space: the move from...