TRACK
1

Cybersecurity strategy

Bill Oliver, Winterhawk Consulting
Thursday, November 29, 2018
10:15 AM - 11:15 AM
Sebastian I-2

Eligible for Information Technology Credits

Dive into hacking methods most commonly used to gain access to SAP systems, examine the impact of a breach, and find out what you can do — right now — to insulate against an ever-changing landscape of threats. Attend this session to... More »

Mahesh Ravinutula, Schlumberger
Troy Siewert, Schlumberger

Thursday, November 29, 2018
11:30 AM - 12:30 PM
Sebastian I-2

Eligible for Computer Science Credits

Hear how Schlumberger, a world-leading provider of technology for the oil and gas industry, got security right from the beginning for its SAP implementation by defining it as an objective of the new deployment. Learn how the company reduced costs and risks while operationalizing the cybersecurity strategy for SAP applications and implementing security validation and monitoring processes. Attend this session to... More »

Todd Babione, KPMG
Friday, November 30, 2018
1:45 PM - 2:45 PM
Sebastian I-1

Eligible for Information Technology Credits

As the threat of cyberattacks increases, existing security and governance strategies are simply no longer adequate to protect interconnected SAP systems. Organizations must change their approach and adopt a holistic SAP security operations and governance strategy that protects the entire SAP technology stack. This session examines the new cybersecurity challenges presented by this evolving IT threat landscape and their impact on data privacy and identity governance. Attend to... More »

Juan Pablo Perez-Etchegoyen, Onapsis
Thursday, November 29, 2018
4:45 PM - 5:45 PM
Sebastian I-1

Eligible for Business Management Credits

Properly securing critical SAP applications relies on the communication of 3 key SAP security stakeholders: Internal audit, which defines the controls relevant to the business; IT security, which doesn’t typically have extensive SAP knowledge; and SAP security, which usually follows the traditional approach of segregation of duties and critical authorizations. Attend this session to... More »

Frederik Weidemann, Virtual Forge
Wednesday, November 28, 2018
10:15 AM - 11:15 AM
Panzacola H-1

Eligible for Information Technology Credits

As SAP solutions and systems grow in functionality, SAP landscapes are also becoming increasingly complex. At the same time, cyber threats and attackers are growing more and more sophisticated, and many businesses struggle to implement a sustainable mitigation strategy. Attend this session to... More »

Juan Pablo Perez-Etchegoyen, Onapsis
Wednesday, November 28, 2018
4:00 PM - 5:00 PM
Sebastian I-2

Eligible for Information Technology Credits

On July 25th, 2018, the US-CERT, part of the Department of Homeland Security, released an alert encouraging users and administrators of ERP systems to review a report that described an increase in the exploitation and vulnerabilities in ERP applications. According to the alert, and the report that supported it, malicious actors — including hacktivists, cybercriminals, and state-affiliated actors — are targeting ERP applications, and attackers can exploit vulnerabilities to obtain access to sensitive information. Attend this session to arm yourself against such attacks, as you... More »

Juan Pablo Perez-Etchegoyen, Onapsis
Charlie Singh, IBM

Wednesday, November 28, 2018
10:15 AM - 11:15 AM
Sebastian I-3

For any large organization, a cybersecurity strategy is a key initiative to ensure that data and critical assets stay secure. However, SAP, the application that houses an organization’s crown jewels, is often overlooked from a cybersecurity perspective. Additionally, traditional security may not address cyber risks at the application level. To address these risks an organization must implement an SAP cybersecurity program that addresses asset management, vulnerability management, incident response, internal audit and compliance, and governance. Join Onapsis and IBM in this session to... More »