Infrastructure in the area of IT enterprises and the constantly growing number of cyber threats are one of the main factors that have a direct influence […]
In the previous part of our series part link, we concluded that managers responsible for business operations must decide when and in what situations the system […]
Mitigating controls are control mechanisms implemented in business processes, for the purpose of limiting the access risk coming from the user excessive authorizations granted in ERP […]
The implementation of additional mitigating controls is a frequent response from the company management in order to limit the risk of excessive (redundant or unnecessary) authorizations […]
In the latest issue of IT Investigation and Security Magazine, Andrzej Partyka has contributed a professional article GRC – terra incognita which describe GRC subject in […]