Keep your sensitive SAP data secure
SAP Production systems typically have thousands of users accessing them. How confident are you in the controls you have in place to keep your sensitive data secure within these systems?
In this session, we look at common loopholes that hackers could find to get access to your sensitive data. They can find ways to circumnavigate your security protocols from within the system.
This 30-minute session highlights:
- A discussion of the three most common SAP hacks
- Ways to prevent unauthorised users from circumnavigating your security protocols
- How to identify where these hacks are taking place
- How to reduce these risks through shrinking your attack surface by anonymising data in your test SAP systems.
About the presenter
Paul Hammersley, VP ALM Product Portfolio at EPI-USE Labs
Paul has for many years been a remarkable technical force at EPI-USE Labs. As VP of the ALM Products, his portfolio includes System Landscape Optimization, and his hands-on experience of implementing Data Sync Manager and helping clients to manage data across the breadth of their SAP landscapes is unique. He has specialised knowledge about data security and how GDPR (the General Data Protection Regulation) impacts companies running SAP.