Skip to content
SAP Live hack webinar

Watch Your SAP go phishing – SAP Live Hack

According to recent research 75% of organizations around the world experienced a phishing attack in 2020. Although most organizations claim to deliver phishing awareness training to their employees, phishing remains the threat type No. 1 to cause a data breach.

Join our webinar and sit in the first row to watch Holger Stumm demonstrate a Live Phishing Attack targeting SAP. Holger Stumm is the managing director and founder of Log(2), a company specialized in SAP cyber security.

You will also learn how the SecurityBridge Platform can successfully detect the attack scenarios. The SAP Security Team is provided with insights needed to form an adequate response and to prevent the organization from further damage.

Still not convinced?! You think that everyone in your organization acts according to your security rules? Just keep in mind: They only need one open door and they’re in.

Key Takeaways:

  • Watch a Live Phishing Attack targeting SAP
  • See how the SecurityBridge platform detects the attack scenarios
  • Learn how you can prevent your organization from further damage

Date & Time

On-Demand

Event Details

Date

On-Demand
Download the White Paper “Which cybersecurity framework is the best fit for SAP application security?” to learn more about the available frameworks, the challenges when adopting a framework, and more.
SAP Cyber risk
SAP Cybersecurity- Security News
Businesses must be more cautious to protect themselves from cyber threats as digitalization and the use of SAP systems increase. SAP S/4HANA is critical for many enterprises as it provides the foundation for business operations. As digitalization and Industry 4.0 continue to increase, SAP S/4HANA lays the foundation for many modern business scenarios. SAP systems are important for many industries and their security is a major concern, making them vulnerable to cyber attackers. This article will discuss cyber risks and how you can assess your individual and organizational SAP systems' risks. What are cyber risks?
Common SAP Patches
SAP Cybersecurity- SAP Patch Management- SAP Security Patch Day- Security News
Installing SAP patches is crucial for maintaining a robust and secure enterprise resource planning (ERP) system. SAP, one of the leading ERP systems in the world, is constantly evolving to meet the changing needs of businesses. As a result, SAP releases various patches to address issues and enhance the functionality of its software. However, installing SAP patches can present challenges for IT teams, such as ensuring minimal disruption to business operations, managing risks, and testing the non-implemented patches. This article will discuss the three most common types of SAP patches- kernel patches, snote patches, and support packs - and the best practices for installing them.
SAP interfaces
SAP Cybersecurity- SAP Interface- Security News
In this blog article, we will explore the importance of SAP interface security and discuss the various measures businesses can take to protect their systems and data. We will also examine some common threats to SAP interfaces and how to mitigate them. To safeguard your business, you need to understand the importance of SAP interface security and take steps to make your interfaces secure.