SAP Hacking – Let Google hack your SAP System 2.0

SAP Hacking – Let Google hack your SAP System 2.0

Attend this session to learn about critical vulnerabilities in SAP systems that are often not properly addressed, as well as, the impact a bad security design has on your SAP system landscape. Gain a firm understanding of the importance proper roles and authorizations have and what you need to consider in your security design. You will also see a live demo of how easily high-privileged users with some spare-time can alter your system and evade SAP’s security framework. Key takeaways will include:

- How to properly secure your SAP System •Understand how easy it is to bypass security due to overreaching authorizations
- A demo of how anyone with the help of the internet can hack your SAP system
- Learn how to easily change standard ABAP code by bypassing standard restrictions
- Debunking other myths about “security restrictions” in SAP systems

This content is available to Premium Members.

Sign In Become a Member

Meet the Experts

More Resources

See All Related Content