“The User is still the Weakest Link in the Security Chain”

Published: 24/April/2023

Reading time: 5 mins

Meet the Authors

Key Takeaways

⇨ The complexity of cybersecurity covers everything from the endpoint and network security up to the application layer security.

⇨ The lack of governance is a key issue that could arise when a company moves to the cloud, even for those who do it independently.

⇨ Cyber recovery and resilience should be prioritized to ensure that organizations can effectively manage and respond to cybersecurity incidents.

Cybersecurity encompasses a wide range of areas, including endpoint and network security, and application layer security. A comprehensive understanding of these aspects is essential for organizations to protect themselves. SAP holds a unique advantage in this realm, as it possesses deep understanding of its own applications and business frameworks across various industries. SAP has created numerous security solutions, including SAP GRC and identity and access management, specifically for its own applications. One of its key assets, the Enterprise Threat Detection (ETD) tool, has undergone significant development and empowers our customers to detect and understand any abnormal activity within their SAP applications and workflows. As the developers of these tools, SAP has a deep understanding of their capabilities, giving them a competitive advantage over other players in the market.
In Part 1 of the interview with SAPinsider, Roland Costea, CISO Enterprise Cloud Services (ECS) at SAP, discusses the importance of cyber resilience, how SAP is framing its cybersecurity strategies as a value driver, challenges that organizations face when they move to the cloud, and the steps businesses can take to enhance their cybersecurity measures.

Mastering SAP Premium Access Membership Required

You must be a Mastering SAP Premium Access member to access this content.

Join Now

Already a member? Log in here

More Resources

See All Related Content