EVENTS & WEBINARS

 Sign up for webinars, and come meet us at one of many events around the world.

Featured Events

9th Sept. 2022, Starts at 12:00 noon

2nd CROSSTHEBRIDGE
Cycling event

Join our cycling community on September 9th in Brabant (NL), get a SecurityBridge cycling shirt and enjoy a wonderful day.

ON-DEMAND

Know Your Attacker Surface

Log4j, ICM,… An jedem SAP Patch Tuesday steigt bei vielen SAP Security Verantwortlichen der Blutdruck. Mit ihm beginnt oft das Wettrennen der SAP-Verantwortlichen gegen potentielle Hacker. Doch wie kann man diesem Aktionismus strategisch sinnvoll begegnen?

on-demand

How to Close the Gap in SAP Compliance

When the auditors ring the doorbell, every SAP client knows what happens next. Christoph Nagy, CEO of SecurityBridge, discusses with Carsten Crantz from PwC Germany on how to master this challenging task.

on-demand

SAP Cyber Security – how does it work?

Join experts from 1st Basis Consulting and SecurityBridge to explore how businesses can get a 360-degree view of their SAP Security posture, and ensure their SAP operations are properly secured.

on-demand

Next-Gen Application Security for SAP

Join roundtable delegates who will discuss the challenges, solutions, and their experiences in simplifying security and combining it across the network and the SAP application, to introduce a shift in paradigm for SAP customers.

on-demand

SAP and Cybersecurity – What you can do to protect yourself

Join IBM and SecurityBridge to hear exclusive content from SAP cybersecurity experts who will share invaluable insight into the best practices and upcoming strategies for SAP cybersecurity.

Latest Resources

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.