TRACK
3

Cybersecurity

Vasudevan E.R., Deloitte

Cyberattacks put an organization’s intellectual property, operations, and reputation at stake. In this session, learn how SAP Enterprise Threat Detection can help you gain a holistic view of securing your SAP environment and set up a robust and powerful security infrastructure that can monitor, detect, and respond to cyber threats. Attend to ... More »

Bill Oliver, Winterhawk Consulting

The Security Audit Log in SAP records security-related system information such as unsuccessful logon attempts, changes to user master records, and RFC calls. The Security Audit Log keeps a record of these activities for your review and investigation. Attend this session to gain a comprehensive overview of what the Security Audit Log is, how to configure and set up the Security Audit Log, and how best to use it. In this session, you will ... More »

Rama Krishna Kotni, EY

Attend this session to better understand what’s changing with SAP S/4HANA and how access to database, application, and presentation layers can be secured. Learn about new SAP S/4HANA and SAP Fiori functionality and tips and tricks for securing them based on recent SAP S/4HANA implementations. Understand SAP S/4HANA architecture and the impact on security and controls requirements at the database, application, and SAP Fiori interface layers. By attending, you will explore ... More »

Chris Radkowski, SAP

The General Data Protection Regulation (GDPR) and other privacy compliance regulations continue to evolve, and organizations struggle to address fundamental issues related to use of personal data. With significant fines now being applied by regulators, attend this session to learn about SAP solutions for privacy compliance to help your organization ensure processes involving personal data are compliant. In this session, SAP will provide solution overviews that cover key areas of GDPR and other privacy regulations including... More »

Christian Cohrs, SAP SE

When you extend your application landscape to the cloud you expect benefits such as increased security, integration and productivity, right? The security and capabilities of the SAP Cloud Platform can make this happen by helping your enterprise leverage cloud business applications in a secure, integrated and indeed, intelligent way. In this session you will learn about... More »

Anand Kotti, Onapsis

Cybersecurity is no longer an afterthought – it’s a top-down mandate, spurred along by the never-ending stream of high-profile breaches splashed across headlines. Come to this open discussion to talk about the challenges of cybersecurity in a digital world and learn how your peers are implementing technology to protect the enterprise. More »

Kevin Heckel, Deloitte & Touche LLP
Manish Singh, Deloitte & Touche LLP

Cyber threats are constantly evolving. Remaining vigilant becomes a challenge — and an imperative. Join this session to explore... More »

Michael Kummer, Xiting

In this session, we’ll explore a best-practice approach, as described in SAP Note 1682316, to analyze authorizations and explain how to redesign over-authorized technical users to limit access to sensitive data and improve compliance with data privacy regulations... More »

Greg Wendt, Appsian
Rajesh Rengarethinam, Appsian

While breaches can cost hundreds of thousands of dollars, traditional security measures generally address outsider threats. It's insider threats that are much more difficult to prevent and detect using traditional security measures. Appsian User behavior analytics (UBA) at application layer gathers insight into the events users generate every day. This information can be used to study behavioral pattern of the users and to apply real-time context-based access controls. More »

Isaac Kimmel, Security Weaver

Explore the benefits and potential risks of using a HANA database. Join this session for an interactive discussion about why HANA is raising security concerns, how to address those concerns, and how to automate the challenging process of provisioning user access in your SAP HANA system. In this session you will gain useful tips on improved workflows, real-time analytics, and mitigating controls to ensure security and compliance and to succeed with HANA user management challenges. More »

Kevin Jones, Onetrust

While global organizations have spent the last several years preparing for the EU’s General Data Protection Regulation (GDPR), the new California Consumer Privacy Act (CCPA) will create new challenges for many businesses that process California resident personal data. In this session, we’ll discuss what this new law means for California consumers, what changes we expect to see before it’s put into effect, and how this law is impacting the status of US federal privacy law. We’ll lay out a guide to demonstrating on-going compliance with privacy regulations like CCPA, and how privacy management software can support security and GRC teams... More »