Skip to content
SAP Live hack webinar

Watch Your SAP go phishing – SAP Live Hack

According to recent research 75% of organizations around the world experienced a phishing attack in 2020. Although most organizations claim to deliver phishing awareness training to their employees, phishing remains the threat type No. 1 to cause a data breach.

Join our webinar and sit in the first row to watch Holger Stumm demonstrate a Live Phishing Attack targeting SAP. Holger Stumm is the managing director and founder of Log(2), a company specialized in SAP cyber security.

You will also learn how the SecurityBridge Platform can successfully detect the attack scenarios. The SAP Security Team is provided with insights needed to form an adequate response and to prevent the organization from further damage.

Still not convinced?! You think that everyone in your organization acts according to your security rules? Just keep in mind: They only need one open door and they’re in.

Key Takeaways:

  • Watch a Live Phishing Attack targeting SAP
  • See how the SecurityBridge platform detects the attack scenarios
  • Learn how you can prevent your organization from further damage

Date & Time

On-Demand

Event Details

Date

On-Demand
Download the White Paper “Bridging the Gap – How SecurityBridge Supports NIST CSF in SAP Environments”. Learn how choosing the right tool can significantly shorten the journey of NIST CSF adoption and improve the security posture of SAP environments.
Senior SAP Developer Singapore
As a Senior SAP Developer, you will be responsible for designing, developing, and maintaining SAP solutions while leading and guiding a team of developers. You will play a crucial role in the development of standard products, and your technical expertise and communication skills will be instrumental in ensuring the success of our projects. This role demands strong leadership, technical acumen, and the ability to collaborate effectively in an international development team.
Earlier this year, IBM presented its 18th edition of ‘The Cost of a Data Breach Report’ (you can find it here). This publication provides detailed and valuable insights into various factors related to data breaches. It is based on research carried out at 553 impacted organizations - any IT security professional should check it out. In this article, we will highlight some of this report’s findings and bring them into the context of SAP security.
We're hiring a financial controller/analyst
As a Controller/Financial Analyst at SecurityBridge, you will play a crucial role in managing and optimizing financial processes, ensuring accurate reporting, and providing strategic financial insights. This is an exciting opportunity for a detail-oriented professional to contribute to the financial success of the fastest-growing cybersecurity provider for SAP systems.