Sox Best Practices Oracle Apps 200410
CrossIdeas Roadshow IBM IAM Governance Andrea Rossi
Reduce sod access violations with effective roles management techniques
Myths, Failures and the Future of Identity Governance
Sap security compliance tools_PennonSoft
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConference2012)
1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.