Skip to content

Together we Grow
VNSG & SAP annual event

We will join this inspiring annual event that is all about the power of partnerships and the continued growth of all SAP professionals. This occasion will mark the start of a growing collaboration for the SAP community in 2024.

Grab this opportunity and experience trends, roadmaps and user stories regarding SAP S/4HANA, Cloud Transformation, AI, Data & Analytics and the latest developments from SAP. Be there and secure yourself a ticket before March 21 via the button below.

Date and time
Thursday, March 28, 2024, walk-in from 09:00 a.m.

Gooiland Theater, Emmastraat 2

Hilversum, The Netherlands


‘Together we Grow’ VNSG & SAP jaarevent

Tijdens dit inspirerende jaarevent draait alles om de kracht van samenwerking en de blijvende groei van alle SAP-professionals. De start van een groeiende samenwerking in 2024 voor de SAP community.

Pak deze kans en ervaar trends, roadmaps en gebruikersverhalen omtrent SAP S/4HANA, Cloud Transformatie, AI, Data & Analytics en de nieuwste ontwikkelingen vanuit SAP. Zorg dat je erbij bent en verzeker jezelf van een ticket voor 21 maart via onderstaande button.

Datum en tijd
Donderdag 28 maart 2024, inloop vanaf 09:00 uur

Gooiland Theater, Emmastraat 2, 

Hilversum, Nederland

Event Details


March 28, 2024

Gooiland Theater, Emmastraat 2

Hilversum, The Netherlands

Download the White Paper “Bridging the Gap – How SecurityBridge Supports NIST CSF in SAP Environments”. Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.
In SAP’s patch round of February 2022, an SAP Security Note was released with a CVSS score of 10/10 named, “Request smuggling and request concatenation in SAP NetWeaver, SAP Content Server and SAP Web Dispatcher”. This particular type of vulnerability is not common in SAP systems and therefore interesting to look at. As patching the SAP kernel executables is often not done promptly, we can expect this vulnerability present in the customer’s systems for quite some time.
code pc
In one of our recent articles, we pointed out the use of Access Control Lists (ACLs) to better manage access control. Below, we will show a practical example of how this can be done for inbound HTTP communication with the ‘Internet Communication Manager’ (ICM) component of an SAP system.
SAP Security Patch Tuesday 2024
For February 2024, 13 new Security Notes have been released and 3 have been updated. Lets look at some highlights, starting with the ‘HowNews’ notes.