SAPinsider EMEA 2023 Conference Event Presentations

  • Tips to Implement MFA for Your SAP applications

    Click Here to View Session Deck. As cyber-attacks continue to multiply, organizations must take measures to prevent the high costs associated with data breach. Conventional security safeguards are increasingly inadequate for protecting the information held in your SAP systems. The session will explore why passwords are the most vulnerable aspect of the security system and…...…

  • Probably the Best SAP Protected System in the World

    Click Here to View Session Deck. This session will offer a glimpse into the journey of one of Onapsis’s customers, including a detailed examination of the implementation process and an overview of the deployed products that ensure the customer’s business remains secure. You will: Gain knowledge about key aspects of security, including Vulnerability Management, Patch…...…

  • Implementation of SAP Access Control in Kerry Group and What Comes After That

    Click Here to View Session Deck. This session will explore the process Kerry Group followed to implement a global SAP landscape, including SAP Access Control. The speakers will elaborate on the requirements Kerry had at a process level and how SAP Access Control was integrated with Service Now, which made its operations safer and easier…...…

  • How to identify suspicious activities with SAP Enterprise Threat Detection

    Click Here to View Session Deck. Designed to provide a hands-on understanding of SAP Enterprise Threat Detection (ETD), this session, led by a team of SAP ETD specialists will learn to effectively identify suspicious activities in SAP S/4HANA and implement proactive mitigation strategies to prevent data breaches. The session will equip attendees with the skills…...…

  • SAP Security in Hybrid System Landscapes

    Click Here to View Session Deck. The implementation of a holistic security architecture is becoming indispensable in the age of cybersecurity and the rapid increase of new applications. The use of cloud-based applications is creating hybrid landscapes that present many customers with new challenges. Not only do cloud solutions need to be secured and documented,…...…

  • DevSecOps, SecDevOps, and Secure Cloud Transformation: Accountability Through Cloud Security Engineering

    Click Here to View Session Deck. As a cloud services provider, it is more important than ever to secure the software and services SAP provides. It is most efficient to manage this in the development cycle as much as possible through a DevSecOps approach that includes security controls every step of the way. However, we…...…