Featured Content
Topics

Explore critical topics shaping today’s SAP landscape—from digital transformation and cloud migration to cybersecurity and business intelligence. Each topic is curated to provide in-depth insights, best practices, and the latest trends that help SAP professionals lead with confidence.

Regions

Discover how SAP strategies and implementations vary across global markets. Our regional content brings localized insights, regulations, and case studies to help you navigate the unique demands of your geography.

Industries

Get industry-specific insights into how SAP is transforming sectors like manufacturing, retail, energy, and healthcare. From supply chain optimization to real-time analytics, discover what’s working in your vertical.

Hot Topics

Dive into the most talked-about themes shaping the SAP ecosystem right now. From cross-industry innovations to region-spanning initiatives, explore curated collections that spotlight what’s trending and driving transformation across the SAP community.

Featured Content
Topics

Explore critical topics shaping today’s SAP landscape—from digital transformation and cloud migration to cybersecurity and business intelligence. Each topic is curated to provide in-depth insights, best practices, and the latest trends that help SAP professionals lead with confidence.

Regions

Discover how SAP strategies and implementations vary across global markets. Our regional content brings localized insights, regulations, and case studies to help you navigate the unique demands of your geography.

Hot Topics

Dive into the most talked-about themes shaping the SAP ecosystem right now. From cross-industry innovations to region-spanning initiatives, explore curated collections that spotlight what’s trending and driving transformation across the SAP community.

application security

Upcoming Events

SAPinsider Las Vegas 2026
Mar 16-19, 2026Las Vegas, Nevada, NV

Related Vendors

6 results
SAP GRC Implementations: Hidden Challenges That Undermine ROIJun 2, 2025  —  SAP GRC's potential is often squandered by organizations due to flawed assumptions and poor design strategies, leading to inefficiencies and increased risks, with key pitfalls including a lack of role design strategy, improper use of automated controls, and misuse of Firefighter IDs.
2 minute read
cybersecurity
Making Application and Data Security Controls a Lynchpin for SAP Cybersecurity ProtectionMar 17, 2025  —  SAPinsider Vegas 2025 will focus on enhancing cybersecurity within SAP environments, addressing the significant rise in cyber threats, particularly ransomware, while emphasizing the importance of integrating comprehensive data security and application security strategies to protect vital ERP data.
2 minute read
“SAP Application Security for Dummies” by PathlockJul 9, 2024  —  This guide, created by Pathlock, is designed to be a user-friendly resource for understanding and implementing SAP application security.
1 minute read
“Security is not simply a subset of IT”May 1, 2023  —  Cybersecurity encompasses a wide range of areas, including endpoint and network security, and application layer security. A comprehensive understanding of these aspects is essential for organizations to protect themselves. SAP holds a unique advantage in this realm, as it possesses deep understanding of its own applications and business frameworks across various industries. SAP has created numerous security solutions, including SAP GRC and identity and access management, specifically for its own applications. One of its key assets, the Enterprise Threat Detection (ETD) tool, has undergone significant development and empowers our customers to detect and understand any abnormal activity within their SAP applications and workflows. As the developers of these tools, SAP has a deep understanding of their capabilities, giving them a competitive advantage over other players in the market. In Part 2 of the interview with SAPinsider, Roland Costea, CISO Enterprise Cloud Services (ECS) at SAP, discusses an overlooked topic in the cybersecurity field that deserves more attention, the top priorities for the year, and the top-line thing organizations must keep in mind if moving to the cloud.
4 minute read
Cybersecurity sessions
“The User is still the Weakest Link in the Security Chain”Apr 24, 2023  —  Cybersecurity encompasses a wide range of areas, including endpoint and network security, and application layer security. A comprehensive understanding of these aspects is essential for organizations to protect themselves. SAP holds a unique advantage in this realm, as it possesses deep understanding of its own applications and business frameworks across various industries. SAP has created numerous security solutions, including SAP GRC and identity and access management, specifically for its own applications. One of its key assets, the Enterprise Threat Detection (ETD) tool, has undergone significant development and empowers our customers to detect and understand any abnormal activity within their SAP applications and workflows. As the developers of these tools, SAP has a deep understanding of their capabilities, giving them a competitive advantage over other players in the market. In Part 1 of the interview with SAPinsider, Roland Costea, CISO Enterprise Cloud Services (ECS) at SAP, discusses the importance of cyber resilience, how SAP is framing its cybersecurity strategies as a value driver, challenges that organizations face when they move to the cloud, and the steps businesses can take to enhance their cybersecurity measures.
5 minute read
A Cyber Risk Framework for the S4 JourneyMar 23, 2021  —  Organizations are heading into an unknown territory where both the technology platform they secure and threats to those platforms are getting more complex. Operational, Technology, and Compliance drivers introduce complexity even as customers expect companies to protect their data better. The cyber risk for the SAP solutions is a journey and should follow a maturity model aligned to your corporate risk appetite and enterprise solutions. Unlike SAP’s other tools that can be utilized with your existing organization, Deloitte works with the clients to appropriately leverage existing enterprise solutions to empower a seamless solution. In this session, Kevin Heckel, Managing Director at Deloitte Risk & Financial Advisory, and Tyler Lewis, Principal at Deloitte Risk & Financial Advisory, will discuss Deloitte's perspective of the cyber domains to secure data, applications, and platform, including cyber governance, application security, data privacy and protection, controls and compliance, identity and access management, infrastructure security, operational security, and monitoring and response. Attend this session to: Learn to drive business value by enabling digital transformation -Get a high-level understanding and be able to discuss cyber risk domains impacted by the S4 journey -Understand how to implement cyber capabilities with industry-leading practices, and increase the cost-efficiency of cyber functions without sacrificing outcomes -Know how to detect and respond to breaches and security incidents to enable a safe and secured user experience
1 minute read