- SAP CyberSecurity
Requirements for Securing Cloud-Based Systems
As organizations accelerate the move of enterprise applications and data into cloud-based and cloud-resident systems, it’s extremely important to ensure that security is in place early to avoid having to backtrack and address these issues. Whether systems are running in Software-as-a-Service, Platform-as-a-Service, or Infrastructure-as-a-Service environments, each deployment offers unique security challenges. This track will help you understand how you can best prepare for the move to the cloud, the steps that you need to take to secure your systems, as well as planning for how to protect your data and identify potential threats to your systems.
Sessions at SAPinsider Cybersecurity2021:
How the Swiss Federal Administration planned their SAP S/4HANA move with security by design in mind– Sinsa Medic
Hardly any other domain has changed as much as cybersecurity in recent years and ensuring SAP security in a dynamic environment is a constant challenge.
As SAP Systems are being more integrated with other (Cloud) solutions, they are nowadays increasingly exposed to higher risks. The extensive use of cloud components is changing the attack vectors of many SAP customers as they experience how SAP S/4HANA migration rapidly leads to a hybrid SAP ecosystem. Very soon the pressure to act increases and SAP customers realize traditional concepts for SAP security are less effective within hybrid landscapes and agile methodologies.
It is time to take back control and build your SAP ecosystem securely from scratch. The earlier security is taken into account, the better, and the migration to SAP S/4HANA is an ideal time to eliminate security deficiencies.
Security must be timely considered in the migration process and “security by design” seems to be a valid approach for this challenge. In this session you will learn how the swiss federal administration adopted this principle within their SAP S/4HANA migration program that was executed with the SAFe methodology, where they defined security by design as an architecture principle.
Take a deep dive and learn how the swiss federal administration is managing SAP Security within its SAP S/4HANA migration program and attend this comprehensive session to:
- Learn what’s security by design and how it can be implemented in a SAP S/4HANA migration project
- Learn how to fill the gaps from the SAP Secure Operations Map and extend it to a holistic SAP Security Framework
- Get practical tips and lessons learned on how to plan your SAP S/4HANA migration considering security by design
- Learn how to execute and orchestrate SAP Security by design within an agile environment
The business benefits of SAP Enterprise Threat Detection- Arndt Lingscheid
Nowadays, not a day goes by without a new data breach being reported in the news. Cyber-attacks often target our IT infrastructure using phishing, smishing, ransomware or malware. The goal is often to disrupt a company’s operations, encrypt databases or block access to carry out extortion.
The average time to contain a security breach is 280 days. Such a long-lasting attack on an SAP S/4HANA Finance application can have even more serious consequences for an organization than an attack on the IT infrastructure if it results in the loss of important data and money and thus violates compliance regulations. In addition, threats to the application environment such as SAP S/4HANA and the IT infrastructure must be equally considered in the risk management of the entire organization.
Enterprise Threat Detection makes suspicious (user) behavior and anomalies in SAP S/4HANA business applications transparent in real time to detect and stop such security breaches in real time.
- Businesses that had not deployed security automation saw an average total cost of $6.03 million, more than double the average cost of a data breach of $2.45 million for businesses that had fully deployed security automation
- The time to contain a security breach on average is 280 days
- Lost business costs $1.52 million accounted for nearly 40% of the average total cost of a data breach
It’s not a question of experiencing a data breach. It’s only a question WHEN!
Join this session to:
- Understand how you can benefit from SAP Enterprise Threat Detection to protect the intelligent enterprise by identifying, analyzing and neutralizing cyber-attacks on your SAP S/4HANA Finance applications
- Discover how security incidents are detected and analyzed and how evidence of an attack is collected and secured
- Learn how to adopt and adapt specific use cases according to your individual application and company policies
Creating a cybersecurity risks dashboard in the SAP Analytics Cloud- Gabriele Fiata
When it comes to securing SAP S/4HANA business applications, organizations tend to face three key challenges: 1) How to enable the application security team to prioritize the necessary cybersecurity actions; 2) How to give the CISO insight into application security risk activities; 3) How to bridge the gap between the problems faced by the CISO and the problems faced by the rest of the C-suite.
One potential way to address these challenges is by building a cybersecurity dashboard using SAP Analytics Cloud and its integration with SAP security solutions, a concept in which several SAP customers have expressed interest, and which SAP is planning to build by working together with customers.
The idea is to create a customizable dashboard that combines the feeds from various cybersecurity solutions, analyzes attacks, and suggests actions for the application security team to prioritize. The dashboard would also give CISOs a snapshot of what their teams are doing at any point in time so they can adjust operations if necessary. In addition, the dashboard would help the board understand how cybersecurity risks can affect strategic business objectives, and make better decisions based on risk mitigation, by providing insight into the monetary value of cybersecurity risks and into the company’s overall risk management status.
Join this session to:
- Understand the organizational benefits of creating a cybersecurity dashboard.
- Explore the different types of information that can be included in the dashboard.
- Learn how you can create a dashboard in SAP Analytics Cloud
Case study on threat detection in SAP applications and implementation of SAP Enterprise Threat Detection – Daniil Luzin and Andrei Nifatov
An important component of a comprehensive security strategy is the control over activities performed within the SAP S/4HANA environment to ensure compliance of the SAP landscape. This includes monitoring the behavior of applications with respect to policies and regulatory requirements, such as data protection requirements.
This customer case study shows the customer situation before implementing SAP Enterprise Threat Detection:
- Central SIEM solution was already implemented at the IT infrastructure level
- No visibility of threats in the SAP landscape
- Uncertainty about security and compliance measures in the SAP S/4HANA environment
- No control over user and system behavior
During the project, the customer was able to provide enterprise-wide visibility of threats within the IT infrastructure and SAP S/4HANA applications, improve credential secrecy and superuser monitoring in SAP S/4HANA, correlate IT and application events, and implement general improvements in basic settings (trust relationships, background jobs, technical users, integration scenarios, etc.).
Attend this session to:
- Learn about a customer implementation of SAP Enterprise Threat Detection
- Understand the benefits SAP Enterprise Threat Detection brings around creating visibility of potential threats within the organization
- Determine how to remove uncertainty and improve control over user and system behavior
Overview of SAP cybersecurity and data protection solutions– Arndt Lingscheid
Cyber-attacks can have severe consequences when it comes to SAP S/4HANA applications. These attacks focus on the company’s application layer and use privileged user accounts. Unfortunately, many security departments see the SAP application layer as a “black box,” and assume the security of SAP applications as the responsibility of their Basis or SAP application colleagues, leaving these applications at risk.
Securing an SAP S/4HANA business application environment involves more than roles and authorizations. The loss of sensitive data can lead to severe penalties, damages reputation, and endanger the overall business of businesses within minutes.
In this session, you will:
- Understand the challenges and needs to secure your SAP landscape
- Know how security frameworks can help lay the foundation for a strong security strategy
- Explore SAP’s portfolio of security and compliance solutions through the lens of the Cybersecurity Framework provided by the National Institute of Standards and Technology (NIST)
- Get overview to the toolkit for creating a comprehensive security strategy to meets your unique needs
- Learn to control the activities with a security infrastructure to meet compliance and business requirements and get insight that helps those at the C level make better decisions
Explore all Cybersecurity2021 Sessions
All Cybersecurity2021 Tracks:
Additional Resources:
Research Report:
Digital transformation and the deployment of applications in the cloud has been a key topic of discussion within the enterprise software market for several years but that conversation has been accelerated by the global events of 2020. Organizations whose workforces had been entirely on-site have had to quickly convert to a remote work environment. Many of those companies have scrambled to address critical infrastructure changes and implement cloud-based applications to provide faster and more reliable access for remote users.
This Event is Sponsored by:
EXPLORE BY RESOURCE TYPE
- Analyst Insights
- Articles
- Blogs
- Buyers Guide
- Case Studies
- Event Presentations
- Events & Conferences
- Expert Insights
- Industry Insights
- Magazine Issue
- Market Insights
- Media Awareness Blog
- Member Insights
- Member Spotlights
- Podcasts
- Press Releases
- Q&A
- Research Reports
- Technology Insights
- Thank You Landing Page
- Videos
- Webinars
- Whitepapers
EXPLORE BY TOPIC
- RISE with SAP
- SAP ABAP
- SAP ABAP Development Tools
- SAP ABAP Test Cockpit
- SAP Access Control
- SAP Accounting
- SAP Administration
- SAP AI
- SAP Analytics
- SAP Analytics and AI
- SAP Analytics Cloud
- SAP API Management
- SAP APO
- SAP Applicant Tracking
- SAP Application Development and Integration
- SAP Application Maintenance
- SAP AR AP
- SAP Architecture
- SAP Ariba Supplier Network
- SAP Asset Accounting
- SAP Asset Analytics
- SAP Asset Management
- SAP Asset Tracking
- SAP Audit Management
- SAP BAPI
- SAP Basis
- SAP Basis Administration
- SAP Benefits Administration
- SAP BI Tools
- SAP Billing Systems
- SAP Blockchain
- SAP BOBJ
- SAP BPC
- SAP BPO
- SAP BRF
- SAP BRIM
- SAP Business AI
- SAP Business Application Studio
- SAP Business Intelligence
- SAP Business Network
- SAP Business Process Management
- SAP Business Suite
- SAP Business Technology Platform
- SAP BW
- SAP BW/4HANA
- SAP Cash Management
- SAP Center of Excellence
- SAP Central Finance
- SAP Change Management
- SAP CIO
- SAP Cloud
- SAP Cloud Connector
- SAP Cloud Integration Platform
- SAP Cloud Migration
- SAP Cloud Platform
- SAP Cloud Providers
- SAP Cloud Strategy
- SAP CMS
- SAP Code Inspector
- SAP COE
- SAP CoE Framework
- SAP CoE Leadership
- SAP CoE Team Structure
- SAP Commerce Cloud
- SAP Concur
- SAP Configuration
- SAP Container Platform
- SAP Contract Management
- SAP Controlling
- SAP COPA
- SAP Cost Center Accounting
- SAP CRM
- SAP Crystal Reporting
- SAP CS
- SAP Customer Data
- SAP Customer Experience
- SAP CyberSecurity
- SAP Data and Data Management
- SAP Data Archiving
- SAP Data Center
- SAP Data Governance
- SAP Data Integration
- SAP Data Migration
- SAP Data Quality
- SAP Data Science
- SAP Data Security
- SAP Data Services
- SAP Data Strategy
- SAP Data Visualization
- SAP Data Warehouse Cloud
- SAP Design Studio
- SAP Development Tools
- SAP DevOps
- SAP Digital Asset Management
- SAP Digital Integration Hub
- SAP Digital Manufacturing Cloud
- SAP Digital Signature
- SAP Digital Transformation
- SAP Digital Twin
- SAP Disaster Recovery
- SAP DMS
- SAP Document Control
- SAP e-invoicing
- SAP EAI
- SAP EAM
- SAP ECC 6.0
- SAP ECC Migration
- SAP ecommerce
- SAP EDI
- SAP EIM
- SAP Enterprise Architect
- SAP Enterprise Architecture Designer
- SAP Enterprise Architecture Framework
- SAP Enterprise Architecture Tools
- SAP Enterprise Asset Management
- SAP Enterprise Threat Detection
- SAP ERP
- SAP ETL
- SAP ETL Tools
- SAP EWM
- SAP Executive Forum
- SAP Extension Suite
- SAP FICO
- SAP Field Service
- SAP Fieldglass
- SAP Finance
- SAP Finance Automation
- SAP Financial Closing Cockpit
- SAP Financial Consolidation
- SAP Financial Planning
- SAP Fiori
- SAP Fiori Elements
- SAP Fraud Management
- SAP FX Risk
- SAP General Ledger
- SAP GIS
- SAP Global Tax Management
- SAP Governance Risk and Compliance
- SAP GRC
- SAP HANA
- SAP HANA Administration
- SAP HANA Deployment Infrastructure
- SAP HANA Enterprise Cloud
- SAP HANA Studio
- SAP HEC
- SAP High Availability
- SAP HRIS
- SAP Human Capital Management
- SAP Hybris
- SAP Hyperion
- SAP Hyperscalers
- SAP IBP
- SAP Identity Management
- SAP Infrastructure
- SAP Integration Suite
- SAP Intelligent Technologies
- SAP Internet of Things
- SAP Inventory Management
- SAP IT Automation
- SAP Label Printing
- SAP Learning Organization
- SAP Leonardo
- SAP Logistics
- SAP Low Code Application Development
- SAP Low Code Automation
- SAP Lumira
- SAP Machine Learning
- SAP Maintenance Management
- SAP Manufacturing
- SAP Manufacturing Automation
- SAP Marketing Analytics
- SAP Marketing Automation
- SAP Marketing Cloud
- SAP Master Data
- SAP Master Data Governance
- SAP MDM
- SAP MES
- SAP Messaging
- SAP Migration Strategy
- SAP MII
- SAP MM
- SAP Mobile Asset Management
- SAP MRO
- SAP MRP
- SAP Netweaver
- SAP Operating Systems
- SAP Order Management
- SAP Order to Cash
- SAP Payment Processing
- SAP Payroll
- SAP Performance Testing
- SAP Plant Maintenance
- SAP Platform and Technology
- SAP Platform Architecture
- SAP PLM
- SAP PMO
- SAP POS
- SAP Predictive Analytics
- SAP Process Analysis
- SAP Process Automation
- SAP Process Control
- SAP Process Design
- SAP Process Integration
- SAP Process Intelligence
- SAP Process Orchestration
- SAP Procure to Pay
- SAP Procurement
- SAP Production Planning
- SAP Profitability Analysis
- SAP Project Management
- SAP Provisioning
- SAP QA
- SAP Quality and Testing
- SAP Quality Management
- SAP Qualtrics
- SAP Rebate Management
- SAP Regulatory Compliance
- SAP Release Management
- SAP RISE
- SAP Risk Analysis
- SAP Risk Management
- SAP Robotics
- SAP RPA
- SAP S/4 HANA Implementation
- SAP S/4HANA
- SAP S/4HANA Finance
- SAP S/4HANA Implementation
- SAP S&OP
- SAP Sales Cloud
- SAP SD
- SAP Security
- SAP Service Cloud
- SAP Service Continuity
- SAP Simulation
- SAP Smart Forms
- SAP Smart Sensing
- SAP Software Testing
- SAP Solution Manager
- SAP SOX Compliance
- SAP Spend Analysis
- SAP Spend Management
- SAP SPM
- SAP SRM
- SAP SuccessFactors
- SAP Supply Chain Management
- SAP Supply Chain Planning
- SAP Sustainability
- SAP System Administration
- SAP Systems Administration
- SAP T Code
- SAP Talent Management
- SAP Testing & Automation Tools
- SAP Time and Attendance
- SAP Track and Trace
- SAP Trade Promotion Management
- SAP Transportation Management
- SAP UI5
- SAP Universal Journal
- SAP Vulnerability Analysis
- SAP Warranty Management
- SAP Web Application Server
- SAP Web IDE
- SAP Workforce Planning
- SAP Workloads
- Technology Executive Forum
More Resources
See All Related Content-
-
-
- SAP CyberSecurity
- Premium
Cybersecurity Threats to SAP Systems 2023
Published: 02/June/2023
Reading time: 1 mins
-
- SAP CyberSecurity
- Premium
Are You Prepared For A Cyber Attack?
Published: 27/July/2022
Reading time: 2 mins