Unable to attend live sessions on the day? Working in a different time zone? Not to worry - all of our live presentations will be recorded and available for you to catch up on at a time of your choosing.
... and that's not all. We're busy lining up further exclusive on-demand content for you to complement our exciting live agenda. Expect to hear SAP expert insight, demos and solution overview sessions. All on-demand content is available for you to check back on any time, either during, or after the event. Here's some of what you can expect:
Overview of SAP Solutions for Cybersecurity and Data Protection
With cyber incidents ranking as a top risk for companies globally according to the 2020 Allianz Risk Barometer, this session will provide you with an overview of the SAP solution for Cybersecurity and Data Protection. After a state of cyber-attacks in the news and a few statistics, get an overview of the new SAP Secure Operations Maps and how it works together with the NIST Cybersecurity framework. The session will then drill down deeper into the various solutions of this portfolio.
Identity Access Governance for Life
Identity Access Governance is a permanent challenge. Companies have to manage this topic carefully to comply to legislation and to minimize their risk. Watch this video to get an understanding of how digital identities and the corresponding authorizations can be managed on a continuous basis, in On-Premise and Cloud landscapes, and especially in SAP environments.
Providing Content for Enterprise Threat Detection
In this presentation SAP’s Daniel van der Putten will talk about the continues content development and shipment to the customer. ETD is offing this service to help customers by delivering new attack detection pattern by default. Learn how the process works and how you as a customer can get the most benefits out of it.
• Content development process
• Shipment to the Customer
• Installation of the new content
• How to use externally build content in customer systems
How to Handle Application Security in Hybrid Landscapes
Attend this session to learn about critical vulnerabilities in SAP systems that are often not adequately addressed. You will learn how two established software solutions help you to address those critical vulnerabilities and manage your authorizations. This is done by implementing an internal control system using the Security Architect, a software module of the Xiting Authorizations Management Suite (XAMS), and by introducing a real-time monitoring and alerting mechanism with SAP Enterprise Threat Detection (SAP ETD). Get an understanding of the importance that roles and authorizations have and what you need to consider in your security design. You will also see a live demo of how easily high-privileged users can alter your system and how an internal control system would have prevented this Learn about:
- SAP security challenges
- Common SAP security risks
- Xiting Security Architect
- SAP Enterprise Threat Detection
- Holistic SAP Security Monitoring
Patrick Spitzer SAP Security Consultant Xiting GmbH