GOVERNANCE, RISK & COMPLIANCE
GOVERNANCE AND COMPLIANCE MANAGEMENT
FIRSTSPIRIT_LINKCompliance and internal governance services are part of a company's value proposition: compliance with statutory requirements, regulations and agreed business rules. Let us help you define internal processes and procedures, implement and monitor them and advise you on fulfilling and implementing GDPR requirements in your IT infrastructure, in the cloud and on end-user devices. What we offer:
General compliance topics:
- Compliance Initial Analysis (1-day workshop)
Data Compliance (GDPR):
- GDPR Initial Analysis (2-day workshop with focus on SAP)
- GDPR Functional Specification and Implementation (Consulting)
- GDPR Package (with focus on SAP HCM)
- GDPR in the Cloud (SAP SuccessFactors & Consulting)
- GDPR Initial Analysis on Data Protection in Office 365 (1-day workshop)
- Data Classification (Consulting)
Licence Compliance (Contracts):
- Cloud Software Licensing (Consulting)
- Microsoft Contract Models (Consulting)
- Licence Management Processes (Consulting)
Process Compliance (Consulting on GDPR & business processes)
FIND OUT MORE FROM OUR EXPERTS
Professional article in Employ! HR Magazin
"Have your deleted personal data yet? Confidently implementing GDPR in your SAP HCM system."
READ ARTICLERISK MANAGEMENT
For many companies, the starting point for developing an individualised security strategy is a check-up on security measures. Let us help you design a strategy tailored to your company, ensuring greater IT security, and build a roadmap. This is based on the results document of the IT Security Assessment and the fields of action derived from it. Additional analyses to reinforce security:
- IT Security Assessment (2-day workshop)
- Shadow IT Analysis (1½-day workshop)
- Active Directory Vulnerability Check
- Consulting & Active Pen Testing
- User Awareness (tools/training/e-learning)
- Data Protector for SAP (consulting, design, implementation & licensing)
- Mobile Endpoint Security (consulting, design, implementation & operations)
FIND OUT MORE FROM OUR EXPERTS
Professional article in Mittelstand Heute magazine
Simple tips to prevent hacker attacks: these 5 rules are especially important for ensuring IT security at mid-sized companies.
READ ARTICLESolution Package Flyer
"Mobile Endpoint Security - Effective Data Protection on Mobile End-User Devices"
PDFWE HAVE PROVEN TO CUSTOMERS THE PRESENCE OF 500 CLOUD APPLICATIONS ALONE OF WHICH THEY HAD PREVIOUSLY BEEN UNAWARE.