This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
• Gena started her career at Oracle as a Purchasing Buyer in June 1998 and evolved within the company as the Procurement Global Process Owner and Source-to-Settle Strategy Owner for 12 years.
• Gena is now a Senior Director leading both the Strategy and Operations teams supporting all Source-to-Pay and Expense-to-Pay functions at Oracle Corporation globally.
• Misuse and policy violations detected in one off situations by manual analysis.
• Expanding post payment analysis in line to organizations goal.
• Difficult to identify misuse over time with multiple expense reports.
• Only limited analysis performed by using multiple reporting tools followed by manual manipulation/review in excel (an inefficient and time consuming process).
• Need an internal tool to perform data mining and analysis on expense reports to support investigations and identify potentially high risk and fraudulent activities.
– Clearly identify what criteria makes something suitable to be a GRC control versus what can be achieved through reporting during the initial stages of the project
– Ensure number of incidents reported is manageable for the end-users
• Promote Modules to Production – Use of export/importing of models and controls between test/production systems is
time-effective and guarantees identical setups on production
• Standard seeded models need adjustments to specific companies needs and available data points
“Oracle’s GRC solution provides a unique approach to the problem of risk management by automating risk controls which are embedded into critical business
processes; applying leading edge technologies to solve complex risk challenges.”