Skip to content
Customer Event

SAP Security Customer Event - Hosted by SecurityBridge, Accenture & bowbridge

The premier SAP Security Customer event is back and better than ever. We’re thrilled to invite you to our ‘Secure Together‘ event, set against the breathtaking backdrop of the Euromast in Rotterdam, the Netherlands.
This event wouldn’t have been possible without the fantastic collaboration of SAP, Accenture, SecurityBridge, and bowbridge. Prepare for an entire day filled with SAP security sessions, spanning a range of topics from predictive analyses and anomaly detection using artificial intelligence (AI) and fortifying defenses against viruses in incoming documents.
As a special touch, we’re extending the day with a delightful dinner at the historic Hotel New York. Your presence would add to the charm of the evening, and we’d love for you to join us. Kindly indicate your dinner preferences on the attached form.
We are looking forward to an exceptional day dedicated to SAP Security and expressing gratitude for your participation!
Please note that this event is strictly limited to in-person attendance. Confirmation of your participation will be provided as soon as possible. 

Date and Time

June 19, 2024
09:00 to 17:30 CEST


Euromast, Parkhaven 20
Rotterdam, The Netherlands

Register here:

For any inquiries, please reach out to or

Event Details

Date and Location

June 19th, 2024
09:00 to 17:30 CEST
Rotterdam, The Netherlands

Download the White Paper “Bridging the Gap – How SecurityBridge Supports NIST CSF in SAP Environments”. Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.
In SAP’s patch round of February 2022, an SAP Security Note was released with a CVSS score of 10/10 named, “Request smuggling and request concatenation in SAP NetWeaver, SAP Content Server and SAP Web Dispatcher”. This particular type of vulnerability is not common in SAP systems and therefore interesting to look at. As patching the SAP kernel executables is often not done promptly, we can expect this vulnerability present in the customer’s systems for quite some time.
code pc
In one of our recent articles, we pointed out the use of Access Control Lists (ACLs) to better manage access control. Below, we will show a practical example of how this can be done for inbound HTTP communication with the ‘Internet Communication Manager’ (ICM) component of an SAP system.
SAP Security Patch Tuesday 2024
For February 2024, 13 new Security Notes have been released and 3 have been updated. Lets look at some highlights, starting with the ‘HowNews’ notes.