Topics

Explore critical topics shaping today’s SAP landscape—from digital transformation and cloud migration to cybersecurity and business intelligence. Each topic is curated to provide in-depth insights, best practices, and the latest trends that help SAP professionals lead with confidence.

Regions

Discover how SAP strategies and implementations vary across global markets. Our regional content brings localized insights, regulations, and case studies to help you navigate the unique demands of your geography.

Industries

Get industry-specific insights into how SAP is transforming sectors like manufacturing, retail, energy, and healthcare. From supply chain optimization to real-time analytics, discover what’s working in your vertical.

Hot Topics

Dive into the most talked-about themes shaping the SAP ecosystem right now. From cross-industry innovations to region-spanning initiatives, explore curated collections that spotlight what’s trending and driving transformation across the SAP community.

Topics

Explore critical topics shaping today’s SAP landscape—from digital transformation and cloud migration to cybersecurity and business intelligence. Each topic is curated to provide in-depth insights, best practices, and the latest trends that help SAP professionals lead with confidence.

Regions

Discover how SAP strategies and implementations vary across global markets. Our regional content brings localized insights, regulations, and case studies to help you navigate the unique demands of your geography.

Hot Topics

Dive into the most talked-about themes shaping the SAP ecosystem right now. From cross-industry innovations to region-spanning initiatives, explore curated collections that spotlight what’s trending and driving transformation across the SAP community.

SAP security

Cybersecurity
Safeguarding SAP Landscapes Amidst Evolving Cyber ThreatsSAP security monitoring uses automated tools to manage vulnerabilities in access control and application security, yet ongoing threats like ransomware and insider risks necessitate comprehensive strategies and third-party services, such as those from Markgraf Consulting, to enhance defenses and ensure system integrity.
NIS2 Compliance for SAP SolutionsThe NIS2 Directive, effective October 17, imposes stringent cybersecurity and incident reporting requirements on EU-based organizations, particularly those managing critical infrastructure and essential SAP solutions, while Layer Seven Security's whitepaper offers guidance for compliance.
cybersecurity
ERP Security for Utility Companies – Onapsis Partners with SNOPUD to Secure Critical SAP ApplicationsCyberattacks on utility companies are increasingly targeting vulnerabilities in SAP applications, posing significant financial and operational risks, with the average cost of a data breach reaching $4.72 million. The energy sector, with its sensitive enterprise resource planning (ERP) systems like SAP, is particularly attractive to cybercriminals. Despite this, many utility companies struggle to allocate adequate resources for security, especially amid ongoing digital transformation efforts. The consequences of such attacks can be severe, leading to business disruptions, power or water outages, and the theft of customer data. To address these challenges, Onapsis, a leader in business application security, has partnered with Snohomish County Public Utility District (SNOPUD) to enhance SAP security through its Connect Up initiative, aimed at upgrading meters across homes and businesses. This collaboration leverages Onapsis' threat intelligence and automated vulnerability remediation to safeguard SNOPUD's critical systems and customer data, supporting a security-first approach as the utility modernizes its operations.
What the SOC?! Clarifying the Audit Certificate Chain and Shared ResponsibilityWith the move to the cloud, managing multiple layers of responsibilities and trust relationships becomes crucial. This presentation explores how SAP handles these responsibilities through central controls, compliance tracking, and collaboration with cloud providers, ensuring security controls are in place and adhered to.
Becoming Cyber Resilient: Why Transforming SAP Security as part of your SAP S/4HANA Upgrade is VitalDiscover how Device Technologies transformed their SAP ECC 6.0 Security Model during their migration to SAP S/4HANA. By implementing an improved security design and governance framework, they effectively addressed risks such as excessive system access, misalignment with business processes, and segregation of duty concerns.
Tackling SAP Security Audits – Tips to Avoid the SAP Security Mop and BucketIn this presentation, Tina, an experienced Compliance Consultant, shares valuable insights on navigating SAP audits and ensuring compliance with regulatory and audit requirements. Learn how to audit IT controls effectively, assess the alignment of your organization with SAP audit requirements, and establish policies and procedures to handle SAP audits. Tina's expertise, gained from over 20 years of experience in SAP Security and Compliance, will provide practical tips for obtaining buy-in from senior management, involving business role owners, and confirming SoD policies.
SAP Security and the Provisioning of SAP AccessThis article highlights the evolution of SAP security, access control (GRC), and IAM solutions, and discusses how organizations can choose the right solution for their needs, including a hybrid model. The article emphasizes the importance of collaboration between SAP security and cyber teams and encourages readers to consider their organization's needs, business objectives, SAP footprint, and risk management priorities before making a decision.
save
IT Operation Transformations Do Not Have to Be Complicated, and They Will Save You MoneyLearn how SAP customers can minimize the manual effort involved in running and maintaining SAP environments by using intelligent technologies to automate repetitive tasks, eliminate human error, and improve the quality and availability of systems and business outcomes. CEO of Avantra, John Appleby, shares his insights on the paradigm shift that has occurred in much of the IT industry when it comes to administering enterprise systems. Read the article to learn: - Where organizations are today in the move to automated IT operations - SAP customers’ concerns over the security of their systems - How investing in automation can free up money for business transformation
How to Build a Strong Security and Compliance Foundation for Your SAP Landscape
How to Build a Strong Security and Compliance Foundation for Your SAP LandscapeWhile most successful cyberattacks are carried out on a company’s application layer, many security departments see the SAP application layer as a “black box,” and its security as the responsibility of their Basis or SAP application colleagues or of a service provider, making the security of this layer a blind spot within many organizations. Compounding this issue are myriad other factors, such as the company size, deployment model, and varying auditor expectations. This article helps SAP decision makers (CIOs, CFOs, and CISOs) and IT operations managers overcome these challenges and secure their SAP landscapes. You will: • Get an overview of how security frameworks can help lay the foundation for a strong security strategy. • Walk through SAP’s portfolio of security and compliance solutions through the lens of the Cybersecurity Framework provided by the National Institute of Standards and Technology (NIST) and how to use them to create a comprehensive security strategy. • Learn how to control security activities with a security infrastructure to meet compliance and business requirements and to provide insight that helps those at the C level make better decisions.
Making SAP S/4HANA Secure from the Start: How to Ensure a Secure Access and Integration Infrastructure for Your SAP S/4HANA Project
Making SAP S/4HANA Secure from the StartWhile an SAP S/4HANA project brings with it a range of exciting new features and functionality, as with any move to a new technology, it can also be intimidating, especially for those who are responsible for securing their organization’s landscape. From a security perspective, there are some new architectures to address with SAP S/4HANA, particularly around the SAP HANA database and the browser-based system access approach. So how can security administrators provide the most secure path forward for an SAP S/4HANA project? This article looks at what security administrators need to know about securing the infrastructure surrounding SAP S/4HANA. You will learn: • Why an SAP S/4HANA migration is a good opportunity to address the security of your organization's SAP landscape • How architectural changes related to SAP S/4HANA affect security in SAP landscapes, as well as what hasn’t changed • Key security considerations related to the HTTP access that is central to the SAP S/4HANA architecture

Related Vendors