Thursday, March 7, 2013 6 years ago 14:00 - 16:30
SAP systems often consist of very complex architectures and employ a myriad of integration choices in order to offer interoperability with enterprise systems. This has led to a situation whereby a SAP deployment can expose an incomprehensibly massive attack surface and can often expose an organization to the very real threat of compromise. As SAP systems are the core operational system of many businesses, even the smallest level of compromise can have devastating effects.
By attending this session you will learn why Segregation of Duty (SoD) controls are just not enough, which current threats exist (data theft, espionage, fraud, sabotage etc.) to your SAP systems that could be exploited by nefarious parties, and how you can utilise traditional and familiar network and application security best practices/principals to help protect your business-critical information from attack.
In this briefing we will: