Protect Your SAP Data from Bad Accidents and Bad Actors- Webinar

398 results

  1. Proven Techniques and Strategies to Fortify Your SAP Landscape from Cybersecurity Threats

    Modern cybersecurity threats are growing in complexity, scale, and speed. In this live Q&A, SAPinsider GRC 2017 speaker Peter Hobson dove into cybersecurity as it relates to your SAP landscape. Read the transcript to get expert answers to your questions on topics like role design, controls, vulnerability scans, supporting tools, and more. What type of…...…
  2. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers…...…
  3. Securing SAP Systems in the Age of Artificial Intelligence

    Historically, SAP has employed conventional methods to secure its systems. However, the most critical areas in SAP cybersecurity now require professionals to leverage AI. The widespread adoption of artificial intelligence (AI) technology has introduced challenges in ensuring the security of SAP systems. To address the evolving cyber threats in the SAP ecosystem, cybersecurity experts specializing…
  4. Getting Ready for the SEC’s Proposed Rules on Cybersecurity

    Learn how to accommodate the potential new rules proposed by the SEC in March of 2020. The National Institute of Standards and Technology (NIST) had released its publication on Integrating Cybersecurity and Enterprise Risk Management (ERM). The intent highlighted there was to help organizations better “identify, assess, and manage their cybersecurity risks in the context…
  5. How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    While most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…
  6. 5 Pillars for Addressing Cybersecurity and Data Protection: SAP Highlights Key Areas for Organizations to Focus on to Build Digital Trust with Employees and Customers

    by Bruce Romney, Senior Director of Product Marketing, GRC and Security Solutions, SAP and Erin Hughes, SAP S/4HANA Finance and Governance, Risk, and Compliance (GRC) Center of Excellence, SAP North America and Thomas Frénéhard, Global Finance and Risk Center of Excellence, SAP What are today’s business leaders most focused on and what are their top…...…
  7. SAP Cybersecurity interview with ChatGPT

    AI is one of the leading topics in all technology industries. Companies of all kinds are looking for the best ways to leverage this rapidly-advancing technology. To take a look at how AI can help bolster cybersecurity, SAPinsider expert Bill Oliver posed some common SAP Cybersecurity questions to notable AI chat model ChatGPT. In this…
  8. Mastering National Cybersecurity Strategy Compliance with PwC

    The White House recently unveiled its US National Cybersecurity Strategy implementation plan in July. The document release came just four months after its initial announcement, which indicates a high level of urgency from the U.S. federal government in addressing cybersecurity issues. According to a White House press release, the plan aims to enact two major…
  9. Layer Seven Security Shares Six Tips to Bolster Cybersecurity Without Breaking the Bank

    Layer Seven Security shares six ways organizations can manage cyber threats without increasing cybersecurity budgets or resources.
  10. Strategies to Thwart Ransomware and Supply Chain Attacks

    Today, enterprises are confronting a myriad of cyberthreats. Two of the most destructive are ransomware and software supply chain attacks. Ransomware attacks have soared over the last couple of years, and that trend has only accelerated. In fact, ransomware attacks have increased 57% since the beginning of this year, and the average number of companies…