Webinar

Industry Leaders

About Our Experts

Susan Stapleton

Vice President, Customer Advisory, Pathlock
Susan is a leading global expert in Governance, Risk, and Compliance with 30 years of experience and 160+ implementations. As SAP’s original GRC product owner, she built the global Customer Advisory community and authored the ERP SoD ruleset still used today. At Pathlock, she guides strategy for enterprise‑wide access governance, SoD monitoring, emergency access, and Continuous Controls Monitoring.

Kelley Vick

Webinar Host, Executive IT Forums, Inc
Kelley Vick is the Online Events Chair at IT CPE Academy, where she hosts and produces the IT GRC Forum webinars. With deep expertise in governance, risk, and compliance, Kelley curates high‑value sessions for cybersecurity and risk leaders, driving community engagement and delivering expert insights.

CPE Webinar | Managing Enterprise Access Risk in a Multi-Application World

May 28 / IT GRC Forum
Today’s enterprise no longer operates on a single ERP platform. Organizations now rely on more than ten critical applications—SAP, Oracle EBS, Ariba, SuccessFactors, Workday, Salesforce, WMS, and others—each with its own roles, risks, and administrators. This distributed landscape creates blind spots where cross‑application access risks emerge, manual reviews fall short, and audits become reactive, time‑consuming exercises. In this session, Susan Stapleton, VP of Customer Advisory at Pathlock with three decades of experience and more than 160 global implementations, will explain what modern, enterprise‑wide access governance requires and how organizations can move from fragmented controls to real‑time, risk‑based assurance.

Attendees will learn why ERP‑centric GRC models break down in multi‑application environments and what a modern governance framework must include. Susan will demonstrate how cross‑application Segregation of Duties risks appear in end‑to‑end processes like Procure‑to‑Pay, and why single‑system rulesets fail to detect them. She will also show how shifting from “Can‑Do” to “Did‑Do” analysis uncovers real transaction‑level violations and helps teams focus remediation where it matters most. Finally, the session will cover how to modernize Access Reviews, emergency access workflows, and Continuous Controls Monitoring to reduce effort, strengthen controls, and deliver measurable reductions in both risk and operational cost.