TRACK
2

SAP application and system security

Frederik Weidemann, Virtual Forge
Thursday, November 29, 2018
1:30 PM - 2:30 PM
Sebastian I-2

Eligible for Information Technology Credits

While every organization deploys risk management controls to protect their IT systems, additional factors must be considered to safeguard your SAP data and applications effectively. In this session, walk through examples and challenges of DevSecOps and discuss techniques to achieve SAP security maturity by taking security by design principles into account. Attend this session to... More »

Abdul Rafey Mohammed, Deloitte
Friday, November 30, 2018
11:30 AM - 12:30 PM
Sebastian I-1

Eligible for Information Technology Credits

Explore how data stored in SAP tables can be viewed and edited by users in production systems. This session takes a deep dive into the different types of tables in SAP, including what makes them editable via table browsing transactions, such as SE16, and how to secure them. You will also learn potential solutions for making table browsing transactions display-only. Attend this session to... More »

Kevin Knight, PwC
Thursday, November 29, 2018
8:30 AM - 9:30 AM
Sebastian I-2

Eligible for Computer Science Credits

Learn how to maximize the effectiveness of your cyber monitoring capabilities and take a deep dive into 3 levels of reporting within SAP Solution Manager. Learn to set up robust reporting to meet your specific requirements and... More »

Matías Sena, Onapsis
Friday, November 30, 2018
3:00 PM - 4:00 PM
Sebastian L-2

Eligible for Information Technology Credits

Trusted remote function call (RFC) relationships are necessary to connect all SAP systems within your entire organization to each other, especially when GRC is present. Learn about the risks that can surface due to a misconfiguration in these connections and walk through the associated business impacts. Attend this session to... More »

Julie Hallett (Ford), Customer Advisory Group
Friday, November 30, 2018
8:30 AM - 9:30 AM
Sebastian I-1

Eligible for Information Technology Credits

Hybrid cloud and local data environments are becoming mainstream and the complexity of risk management is consistently increasing. Does moving business processes and data into the cloud transfer risk? System, user, and data risks are divided and managed differently in these new hybrid environments. Attend this session to... More »

Jim Hoover, KPMG
Wednesday, November 28, 2018
2:45 PM - 3:45 PM
Sebastian I-2

Eligible for Information Technology Credits

The number of SAP security patches continues to rise, but many organizations put themselves at significant risk by waiting for service pack upgrades to fix the issues. This session is designed to help you build a tighter and more proactive patch management process to close system vulnerability gaps as they arise. Attend and learn how to... More »

Juan Pablo Perez-Etchegoyen, Onapsis
Wednesday, November 28, 2018
11:30 AM - 12:30 PM
Panzacola H-2

Eligible for Information Technology Credits

With increasing focus on SAP cybersecurity, teams often struggle to prioritize the most pressing risks and address them accordingly. Learn to identify the most critical security risks and address them with an eye toward return on investment. Attend this session to... More »

Bill Oliver, Winterhawk Consulting
Thursday, November 29, 2018
10:15 AM - 11:15 AM
Sebastian I-2

Eligible for Information Technology Credits

Dive into hacking methods most commonly used to gain access to SAP systems, examine the impact of a breach, and find out what you can do — right now — to insulate against an ever-changing landscape of threats. Attend this session to... More »

Todd Babione, KPMG
Friday, November 30, 2018
1:45 PM - 2:45 PM
Sebastian I-1

Eligible for Information Technology Credits

As the threat of cyberattacks increases, existing security and governance strategies are simply no longer adequate to protect interconnected SAP systems. Organizations must change their approach and adopt a holistic SAP security operations and governance strategy that protects the entire SAP technology stack. This session examines the new cybersecurity challenges presented by this evolving IT threat landscape and their impact on data privacy and identity governance. Attend to... More »

Alessandro Banzer, Xiting
Friday, November 30, 2018
10:15 AM - 11:15 AM
Sebastian I-1

Eligible for Information Technology Credits

Learn about potential vulnerabilities in SAP systems that are often not properly addressed and explore the impact a bad security design has on your SAP system landscape. Walk through the importance of proper roles and see a live demo of how high-privileged users with some spare time can alter your system and evade SAP’s security framework. Attend this session to... More »

Frederik Weidemann, Virtual Forge
Wednesday, November 28, 2018
10:15 AM - 11:15 AM
Panzacola H-1

Eligible for Information Technology Credits

As SAP solutions and systems grow in functionality, SAP landscapes are also becoming increasingly complex. At the same time, cyber threats and attackers are growing more and more sophisticated, and many businesses struggle to implement a sustainable mitigation strategy. Attend this session to... More »

Juan Pablo Perez-Etchegoyen, Onapsis
Charlie Singh, IBM

Wednesday, November 28, 2018
10:15 AM - 11:15 AM
Sebastian I-3

For any large organization, a cybersecurity strategy is a key initiative to ensure that data and critical assets stay secure. However, SAP, the application that houses an organization’s crown jewels, is often overlooked from a cybersecurity perspective. Additionally, traditional security may not address cyber risks at the application level. To address these risks an organization must implement an SAP cybersecurity program that addresses asset management, vulnerability management, incident response, internal audit and compliance, and governance. Join Onapsis and IBM in this session to... More »

Andreas Gloege, Virtual Forge
Thursday, November 29, 2018
2:45 PM - 3:45 PM
Sebastian I-3

When creating SAP Fiori or SAPUI5 applications, end users gain the ability to access data in their SAP back-end system from any device, meaning that sensitive data can be access from mobile devices or laptops outside of the firewall. Accordingly, security needs to be built into the software development lifecycle to follow a security-by-design approach to protect your information from malicious users and potential attacks. In this session, learn how to validate the security of your SAP Fiori applications early in software development. Attend to explore... More »

Keith Goldschmidt, Fastpath
Jayden Weinschenk, Fastpath

Thursday, November 29, 2018
2:45 PM - 3:45 PM
Sebastian L-3

Are you or your company worried about an upcoming audit, or perhaps wondering if your approach to security is following a sound methodology? Not sure how best to approach the planning, delivery, and maintenance of security? Attend this session to review 6 areas of control monitoring, that when set up correctly, should prepare your company for the next audit, and more importantly provide the framework for successfully maintaining and managing security inside your ERP. By attending, you’ll learn... More »