Application Security , Next-Generation Technologies & Secure Development , Standards, Regulations & Compliance

6 Critical Capabilities for an Application GRC Solution

Saviynt's Keri Bowman on How to Ensure Your Program Stacks Up With the Best
Keri Bowman, director, solutions and strategy, Saviynt

With application GRC more critical than ever in today's dynamic, dispersed environment, what are the critical capabilities needed in a solution? Keri Bowman of Saviynt offers six recommendations, including risk reporting and out-of-the-box rule sets and compliance management.

In a video interview with Information Security Media Group, Bowman discusses:

  • The criticality of application GRC;
  • Goals of a GRC solution;
  • The six critical capabilities needed.

Bowman's background includes 12 years of experience in ERP access governance, risk and compliance. She previously worked with consulting firms as a subject matter expert for SAP security design, implementation, management and IT audit. Her expertise is in security design and GRC tool selection and implementation with an emphasis on simplification, risk reduction, compliance and governance process implementation for long-term sustainability.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.