Skip to content
SAP Live hack webinar

Watch Your SAP go phishing – SAP Live Hack

According to recent research 75% of organizations around the world experienced a phishing attack in 2020. Although most organizations claim to deliver phishing awareness training to their employees, phishing remains the threat type No. 1 to cause a data breach.

Join our webinar and sit in the first row to watch Holger Stumm demonstrate a Live Phishing Attack targeting SAP. Holger Stumm is the managing director and founder of Log(2), a company specialized in SAP cyber security.

You will also learn how the SecurityBridge Platform can successfully detect the attack scenarios. The SAP Security Team is provided with insights needed to form an adequate response and to prevent the organization from further damage.

Still not convinced?! You think that everyone in your organization acts according to your security rules? Just keep in mind: They only need one open door and they’re in.

Key Takeaways:

  • Watch a Live Phishing Attack targeting SAP
  • See how the SecurityBridge platform detects the attack scenarios
  • Learn how you can prevent your organization from further damage

Date & Time

On-Demand

Event Details

Date

On-Demand
Download the White Paper “Bridging the Gap – How SecurityBridge Supports NIST CSF in SAP Environments”. Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.
hacking
In SAP’s patch round of February 2022, an SAP Security Note was released with a CVSS score of 10/10 named, “Request smuggling and request concatenation in SAP NetWeaver, SAP Content Server and SAP Web Dispatcher”. This particular type of vulnerability is not common in SAP systems and therefore interesting to look at. As patching the SAP kernel executables is often not done promptly, we can expect this vulnerability present in the customer’s systems for quite some time.
code pc
In one of our recent articles, we pointed out the use of Access Control Lists (ACLs) to better manage access control. Below, we will show a practical example of how this can be done for inbound HTTP communication with the ‘Internet Communication Manager’ (ICM) component of an SAP system.
SAP Security Patch Tuesday 2024
For February 2024, 13 new Security Notes have been released and 3 have been updated. Lets look at some highlights, starting with the ‘HowNews’ notes.