TRACK
6

Threat detection and monitoring

Juan Pablo Perez-Etchegoyen, Onapsis
Wednesday, November 28, 2018
1:30 PM - 2:30 PM
Sebastian I-1

Eligible for Information Technology Credits

Being able to quickly detect a data or systems breach is paramount to mitigating the potential fallout and mounting an effective response. If your SAP systems are breached, it is important to have certain protocols in place to help with forensics and determine the level of impact to your organization. Attend this session to... More »

Mahesh Ravinutula, Schlumberger
Troy Siewert, Schlumberger

Thursday, November 29, 2018
11:30 AM - 12:30 PM
Sebastian I-2

Eligible for Computer Science Credits

Hear how Schlumberger, a world-leading provider of technology for the oil and gas industry, got security right from the beginning for its SAP implementation by defining it as an objective of the new deployment. Learn how the company reduced costs and risks while operationalizing the cybersecurity strategy for SAP applications and implementing security validation and monitoring processes. Attend this session to... More »

Kevin Knight, PwC
Thursday, November 29, 2018
8:30 AM - 9:30 AM
Sebastian I-2

Eligible for Computer Science Credits

Learn how to maximize the effectiveness of your cyber monitoring capabilities and take a deep dive into 3 levels of reporting within SAP Solution Manager. Learn to set up robust reporting to meet your specific requirements and... More »

Tobias Keller, SAP
Wednesday, November 28, 2018
11:30 AM - 12:30 PM
Panzacola H-1

Eligible for Information Technology Credits

Learn about SAP’s next-generation cyber security solution, SAP Enterprise Threat Detection, and how to leverage it to identify, analyze, and neutralize cyberattacks as they’re happening, and before serious damage occurs. Learn how to leverage automatic detection of suspicious activities and enable real-time analysis of security events. Attend this session to... More »

Manish Singh, Deloitte
Friday, November 30, 2018
3:00 PM - 4:00 PM
Sebastian L-1

Eligible for Computer Science Credits

Cyber threats are constantly evolving. Remaining vigilant becomes a challenge — and an imperative. Walk through leading industry practices for cyber risk management and take a deep dive into how SAP Business Integrity Screening with machine learning and robotic process automation (RPA) capabilities can help you detect and address financial abnormalities in real time. Attend this session to... More »