TRENDING TAGS

Cybersecurity and application security is a trend-driven field. While attackers continue to improve their attack techniques, defenders need to pay attention to these new trends. Follow our trending tags for information on specific topics.

Next-Gen Application Security for SAP

Join roundtable delegates who will discuss the challenges, solutions, and their experiences in simplifying security and combining it across the network and the SAP application, to introduce a shift in paradigm for SAP customers.

SAP and Cybersecurity – What you can do to protect yourself

Join IBM and SecurityBridge to hear exclusive content from SAP cybersecurity experts who will share invaluable insight into the best practices and upcoming strategies for SAP cybersecurity.

Expert-Talk: Hybride SAP-, Cloud- und Non-SAP-Landschaften brauchen NextGen-Security

SAP-Integration von Cloud- und Non-SAP-Anwendungen steht weit oben auf der Agenda vieler IT-Organisationen— dies bereitet den Security-Verantwortlichen zusätzliches Kopfzerbrechen. Warum? Weil die Komplexität weiter zunimmt, die IT-Landschaften durch neue Interfaces noch undurchsichtiger werden und die Risiken überproportional steigen.

SAP Cyber Security – how does it work?

Join experts from Turnkey Consulting and SecurityBridge to explore how businesses can get a 360-degree view of their SAP Security posture, and ensure their SAP operations are properly secured.

Watch Your SAP go phishing – SAP Live Hack

Join our webinar, to learn how to identify and prevent an SAP cyber-attack. You will sit in the first row to watch cybersecurity expert Holger Stumm demonstrate a live Phishing Attack targeting SAP.

Next-generation application security for SAP

Join experts from Fortinet and SecurityBridge to learn how speed-to-security and adequate response capabilities can become key actions in your defense again SAP cyber-attacks.

How to implement and enforce a security baseline for SAP ?

Join and listen to our webinar, to learn how you can use the SecurityBridge platform to define and apply one or multiple baselines, receive alerts whenever the system again deviates...

SAP Cybersecurity Beyond Authorizations

Watch the webinar on-demand at any time to learn what „holistic“ really means in the context of SAP security...

SAP Sicherheit auf dem Prüfstand – Ein ganzheitlicher Ansatz

#ITOK21 | IT-Onlinekonferenz.de | Helge Sanden und Christoph Nagy
Ständig hört man von Cyberangriffen und die meisten Unternehmen haben bereits ...

How to accelerate SAP Security?

Watch the webinar recording to learn how you can accelerate your SAP security initiatives. Special Guest, Sanofi’s SAP Security Leader speaking about their journey ...

Latest Resources

Your Road to SAP Security

Download the White Paper "YOUR ROAD TO SAP SECURITY" to learn about the major milestones towards increasing the cybersecurity posture of your SAP systems.

Top mistakes to avoid in SAP security

Within this whitepaper you will learn about the key mistakes that can be avoided when it comes to SAP Security. History has shown that many companies have suffered from cyber incidents, moreover, not all incidents are reported or have been made available to the public.

SAP Security Product Comparison Report

Download the SAP Security Product Comparison Report and understand that holistic security for SAP can be delivered by a single solution.

How remote working affects your SAP security posture

In our webinar on May 7th, we showcased a potential attack on an SAP system, using techniques which are common tools among hackers. Using a password spray attack, we first tried to gain access to the system and subsequently extracted the password hashes of all users.