EVENTS & WEBINARS
Sign up for webinars, and come meet us at one of many events around the world.
Featured Events
on-demand
How to Close the Gap in SAP Compliance
When the auditors ring the doorbell, every SAP client knows what happens next. Christoph Nagy, CEO of SecurityBridge, discusses with Carsten Crantz from PwC Germany on how to master this challenging task.
on-demand
SAP Cyber Security – how does it work?
Join experts from 1st Basis Consulting and SecurityBridge to explore how businesses can get a 360-degree view of their SAP Security posture, and ensure their SAP operations are properly secured.
on-demand
Next-Gen Application Security for SAP
Join roundtable delegates who will discuss the challenges, solutions, and their experiences in simplifying security and combining it across the network and the SAP application, to introduce a shift in paradigm for SAP customers.
- #ibmsecurity
on-demand
SAP Security – What you can do to protect yourself
Join IBM and SecurityBridge to hear exclusive content from SAP cybersecurity experts who will share invaluable insight into the best practices and upcoming strategies for SAP cybersecurity.
on-demand
Hybride SAP und Non-SAP-Landschaften brauchen Security
SAP-Integration von Cloud- und Non-SAP-Anwendungen steht weit oben auf der Agenda vieler IT-Organisationen— dies bereitet den Security-Verantwortlichen zusätzliches Kopfzerbrechen. Warum? Weil die Komplexität weiter zunimmt, die IT-Landschaften durch neue Interfaces noch undurchsichtiger werden und die Risiken überproportional steigen.
Latest Resources
- White Paper
How SecurityBridge Supports NIST CSF in SAP Environments
Download the White Paper "Bridging the Gap - How SecurityBridge Supports NIST CSF in SAP Environments". Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.
- White Paper
Which cybersecurity framework is the best fit for SAP application security?
Download the White Paper "Which cybersecurity framework is the best fit for SAP application security?" to learn more about the available frameworks, the challenges when adopting a framework, and more.
- White Paper
Your Road to SAP Security
Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.
- White Paper
Top mistakes to avoid in SAP security
Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.
- Report
SAP Security Product Comparison Report
Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.
- Video
How remote working affects your SAP security posture
Remote work is posing new challenges to companies' SAP security posture. In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.