Securing SAP Systems in the Age of Artificial Intelligence

512 results

  1. How SAP Users Can Optimize Cloud Migration by Leveraging Partnerships

    The countdown toward the deadline for SAP ECC maintenance in 2027 is getting closer and closer for SAP users. Cloud migration is now one of the most discussed and sought-after ERP enhancements. Knowing how complex the transformation is going to be for many companies, SAP has been consistently developing and enhancing its RISE with SAP…

  2. Rubrik and Microsoft Collaborate to Enhance Cyber Resilience with AI-Powered Security Solutions

    Rubrik has announced a joint collaboration with Microsoft to integrate Rubrik Security Cloud with Microsoft Sentinel and Azure OpenAI Service.

  3. Cybersecurity sessions

    “The User is still the Weakest Link in the Security Chain”

    Reading time: 5 mins

    Cybersecurity encompasses a wide range of areas, including endpoint and network security, and application layer security. A comprehensive understanding of these aspects is essential for organizations to protect themselves. SAP holds a unique advantage in this realm, as it possesses deep understanding of its own applications and business frameworks across various industries. SAP has created…

  4. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers…...…

  5. Getting Ready for the SEC’s Proposed Rules on Cybersecurity

    Learn how to accommodate the potential new rules proposed by the SEC in March of 2020. The National Institute of Standards and Technology (NIST) had released its publication on Integrating Cybersecurity and Enterprise Risk Management (ERM). The intent highlighted there was to help organizations better “identify, assess, and manage their cybersecurity risks in the context…

  6. How to Build a Strong Security and Compliance Foundation for Your SAP Landscape

    While most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding…

  7. 5 Pillars for Addressing Cybersecurity and Data Protection: SAP Highlights Key Areas for Organizations to Focus on to Build Digital Trust with Employees and Customers

    by Bruce Romney, Senior Director of Product Marketing, GRC and Security Solutions, SAP and Erin Hughes, SAP S/4HANA Finance and Governance, Risk, and Compliance (GRC) Center of Excellence, SAP North America and Thomas Frénéhard, Global Finance and Risk Center of Excellence, SAP What are today’s business leaders most focused on and what are their top…...…

  8. SAP Cybersecurity interview with ChatGPT

    AI is one of the leading topics in all technology industries. Companies of all kinds are looking for the best ways to leverage this rapidly-advancing technology. To take a look at how AI can help bolster cybersecurity, SAPinsider expert Bill Oliver posed some common SAP Cybersecurity questions to notable AI chat model ChatGPT. In this…

  9. “Security is not simply a subset of IT”

    Cybersecurity encompasses a wide range of areas, including endpoint and network security, and application layer security. A comprehensive understanding of these aspects is essential for organizations to protect themselves. SAP holds a unique advantage in this realm, as it possesses deep understanding of its own applications and business frameworks across various industries. SAP has created…

  10. Cyber Risk Quantification in SAP and the SAP Cybersecurity Dashboard

    Click Here to View Session Deck. Understanding the potential impact of cyber threats on business processes and estimating potential losses is crucial for making informed risk-based decisions. This session will explore the concept of Cyber Risk Quantification, its significance in today’s cybersecurity strategies, and the process of quantifying cyber risks especially in the SAP realm,…...…