About the EventThe Cybersecurity for SAP Customers 2018 is an interesting event for all SAP customers that have, or want to gain awareness about securing their most critical IT systems. Proven strategies and techniques to secure SAP® landscapes and critical data in the age of cloud and mobile computing.
> 3 CONFERENCES – 1 LOCATION
Cybersecurity for SAP Customers 2018 is co-located with BI & HANA 2018 and Basis & SAP Administration 2018. Registration for 1 event provides access to sessions across all 3 events.
> CUSTOMER CASE STUDIES
Hear how leading companies tackle their projects and initiatives. Take away best practices and methodologies taught by the companies that use them, and learn how to better utilize your existing technology and plan for the future. Hear how your peers have shortened project times, cut costs, evaluated key criteria, and ultimately achieved success on massive, high-stakes initiatives.
> ASK THE EXPERTS SESSION
Sit down with leading experts on SAP cybersecurity to get detailed answers to your toughest questions. Draw on the real-world experiences of some of the industry’s top technologists and tap into one-on-one time with experts and walk away with detailed answers to the questions that matter most to you.
Our customers Case-Study
In a Case-Study, the Head of Global Network & Cybersecurity Services at MERCK KGaA in Darmstadt, Mr. Branden Newman will explain, how integrated its global SAP landscape into its existing 24/7 Security Operations Centre (SOC) monitoring and incident response processes and how SecurityBridge helped them to archieve their goal.
Real-time Threat Analysis
Our college Ivan Mans will teach about the need for real-time security threat analysis. In an eye-opening demonstrate, he will explain how fast an SAP system can be compromised if one has not taken appropriate measures to protect the systems again such threats.
Sit in the passenger seat for a real-time “ethical hack” on an SAP system and learn how attackers, both outside and inside your organization, could access your most prized data. Find out how you can address potential vulnerabilities and configure your system to ensure that security events are being properly logged.