Cybersecurity Threats to SAP Systems 2023

358 results

  1. How to Secure and Monitor Your SAP Systems from Cyber Threats without Third-Party Software

    Reading time: 6 mins

    Aman Dhillon explains how to secure your SAP systems from cyber attacks using SAP Configuration Validation. Key Concept Configuration Validation (CV) is a standard diagnostics tool available in SAP Solution Manager 7.0 and up. It enables companies to perform vulnerability checks to detect and remove security weaknesses in SAP systems. This includes vulnerabilities in areas…...…
  2. SAPinsider Market Insight Featured Image

    Industries Prioritize Cyber Threats Differently

    Reading time: 1 mins

    Between January and March 2022, SAPinsider surveyed 346 members of our community about the cybersecurity threats to their SAP systems. 31% of those respondents said their organization was in the Software & Technology sector, 20% were from the Manufacturing & Agriculture sector, and 11% were from the Healthcare & Life Sciences sector. The full findings…
  3. Proven Techniques and Strategies to Fortify Your SAP Landscape from Cybersecurity Threats

    Reading time: 19 mins

    Modern cybersecurity threats are growing in complexity, scale, and speed. In this live Q&A, SAPinsider GRC 2017 speaker Peter Hobson dove into cybersecurity as it relates to your SAP landscape. Read the transcript to get expert answers to your questions on topics like role design, controls, vulnerability scans, supporting tools, and more. What type of…...…
  4. How to Protect Your Data from Today’s Biggest Cybersecurity Threats: Q&A on Managing Security in Your SAP Landscape

    Reading time: 28 mins

    Modern enterprises are facing a perfect storm of increasingly sophisticated technology, changing regulations, and cybersecurity attacks that are rapidly growing in their scale, scope, and speed. In today’s technology landscape, cloud and mobile connectivity to SAP systems demand more than just network firewalls and perimeters to effectively protect your applications, and auditors and compliance managers…...…
  5. 5 Pillars for Addressing Cybersecurity and Data Protection: SAP Highlights Key Areas for Organizations to Focus on to Build Digital Trust with Employees and Customers

    Reading time: 11 mins

    by Bruce Romney, Senior Director of Product Marketing, GRC and Security Solutions, SAP and Erin Hughes, SAP S/4HANA Finance and Governance, Risk, and Compliance (GRC) Center of Excellence, SAP North America and Thomas Frénéhard, Global Finance and Risk Center of Excellence, SAP What are today’s business leaders most focused on and what are their top…...…
  6. Securing the SAP Landscape Against Cyber Threats Benchmark Webinar

    May 14, 2021

    Over the past several years SAP systems have increasingly been targeted for cybersecurity attacks as they contain some of the most critical data within the organization. Part of the reason for this is the fact that those SAP systems are increasingly becoming more connected with each other, with applications like SAP SuccessFactors and SAP Ariba…...…
  7. Securing the SAP Landscape Against Cyber Threats Benchmark Report

    Reading time: 1 mins

    In This Report: Over the past several years SAP systems have increasingly been targeted for cybersecurity attacks as they contain some of the most critical data within the organization. Part of the reason for this is the fact that those SAP systems are increasingly becoming more connected with each other, with applications like SAP SuccessFactors…
  8. cybersecurity

    A Holistic Approach to Managing Cybersecurity & Protecting Your Data

    Reading time: 8 mins

    The COVID-19 pandemic has ushered in a new paradigm in which legacy security tools and practices have left gaping holes in corporate data protection. To plug these gaps and counter increasing threats, organizations should employ a holistic approach to cybersecurity, privacy, and data protection. Scott Margolis, Managing Director for the Data Privacy and Protection Practice…
  9. Getting Ready for the SEC’s Proposed Rules on Cybersecurity

    Reading time: 8 mins

    Learn how to accommodate the potential new rules proposed by the SEC in March of 2020. The National Institute of Standards and Technology (NIST) had released its publication on Integrating Cybersecurity and Enterprise Risk Management (ERM). The intent highlighted there was to help organizations better “identify, assess, and manage their cybersecurity risks in the context…
  10. Securing SAP Systems

    Reading time: 11 mins

    Panelists: Frederik Weidemann and Stephen Lamy Sponsor: Virtual Forge Your SAP systems and the data within are an integral part of your business. You need to ensure your SAP applications are secure and stable, but there are a wide array of cybersecurity threats to worry about. Find out how to secure your SAP landscape from…...…