TRACK
5

Identity and Access Management

Christian Cohrs, SAP SE
Thursday, November 29, 2018
8:30 AM - 9:30 AM
Sebastian I-1

Eligible for Computer Science Credits

When SAP customers extend their existing landscape toward the cloud, the business expects to benefit quickly from their new cloud-based applications. However, without a way to create user accounts and assign roles, end users will be unable to do their jobs. Instead of carrying the burden and compliance risk of manual processes, customers need to establish a fully automated identity lifecycle management for the cloud that drives productivity and compliance. In this session, you will... More »

Christian Cohrs, SAP SE
Thursday, November 29, 2018
11:30 AM - 12:30 PM
Sebastian I-1

Eligible for Computer Science Credits

End user authentication relies typically on a password: A piece of information that only the legitimate owner of the account knows. However, information is easy to steal. When it is in electronic form, even a fully automated attack from a remote location is feasible. Multi-factor authentication is a well-known approach to add a second layer of security to the authentication process that is more difficult to intercept and replicate than a password. In this session, you will... More »

Chris Radkowski, SAP
Friday, November 30, 2018
10:15 AM - 11:15 AM
Sebastian I-2

Eligible for Computer Science Credits

With digital transformation, some of the core business functions such as HR, finance, and expense management are leaving on-premise and moving to the cloud, creating new access governance challenges. Learn to address the challenges of access governance in the cloud with the metric-driven access governance, role design tools, and cloud application provisioning afforded by SAP Cloud Identity Access Governance. Attend this session to learn how... More »

Alessandro Banzer, Xiting
Friday, November 30, 2018
10:15 AM - 11:15 AM
Sebastian I-1

Eligible for Information Technology Credits

Learn about potential vulnerabilities in SAP systems that are often not properly addressed and explore the impact a bad security design has on your SAP system landscape. Walk through the importance of proper roles and see a live demo of how high-privileged users with some spare time can alter your system and evade SAP’s security framework. Attend this session to... More »

Tobias Keller, SAP
Thursday, November 29, 2018
4:45 PM - 5:45 PM
Sebastian I-2

Eligible for Information Technology Credits

Join this session to get to know 2 novel SAP solutions that can help decrease the probability and magnitude of data abuse from within your organization. See the solutions in action and understand how these generic and configurable solutions enable you to avoid or technically prevent unwarranted access to sensitive data. Attend to... More »

Julie Hallett (Ford), Customer Advisory Group
Friday, November 30, 2018
8:30 AM - 9:30 AM
Sebastian I-1

Eligible for Information Technology Credits

Hybrid cloud and local data environments are becoming mainstream and the complexity of risk management is consistently increasing. Does moving business processes and data into the cloud transfer risk? System, user, and data risks are divided and managed differently in these new hybrid environments. Attend this session to... More »

Raymond Mastre, PwC
Wednesday, November 28, 2018
1:30 PM - 2:30 PM
Sebastian I-2

Eligible for Information Technology Credits

Companies moving to SAP S/4HANA have a tremendous opportunity to use the replatforming to strengthen their SAP security design. Attend this session to learn leading practices on how to integrate new transactions, authorization objects, and values into a role design that can save both time and money. By attending, you will... More »

Andreas Gloege, Virtual Forge
Wednesday, November 28, 2018
1:30 PM - 2:30 PM
Sebastian I-3

As part of a transformation project for SAP S/4HANA, customers are exploring going to the cloud or staying on-premise. Join this session to explore system security and how it is applicable for both on-premise and cloud deployments. Learn how system security goes beyond simple profile parameter and security patch validation and explore the need to validate and monitor policies and authorization, configurations on the ABAP or SAP HANA side, and the interfaces between different SAP applications and into non-SAP applications. By attending, you will... More »