Regardless of whether SAP software is the beating heart of your company’s back and front office or runs remotely as a standalone system or in a subsidiary, your SAP software interacts, shares data and sign-on credentials, and lives within the same ecosystem as your non-SAP assets. This means that your efforts towards managing the cyber-security of your company can’t be limited to protecting your SAP systems alone: you need to take into account how you manage the cyber-security of these non-SAP systems as part of your overall SAP security regime. 

If you’re like most SAP customers, your SAP portfolio includes more than just ECC 6.0: your company may already have implemented or is considering implementing SAP HANA and S/4 HANA, or some of SAP’s recent acquisitions like SuccessFactors, Ariba, Concur, and hybris. With these systems in the landscape, the complexity of the cyber-security challenge in your company has become vast and potentially overwhelming. However vast and potentially overwhelming hackers and their ilk are after your company’s data and intellectual property regardless of what systems they reside in, and that means SAP cybersecurity needs to be a holistic effort that takes a system-wide approach to SAP cyber-security. 

Josh and Chris will discuss the overall issues in taking a holistic approach to SAP cyber-security and how companies can approach cyber-security from this new perspective. You will also learn the additional topic areas to be covered as part of ASUG’s Cyber-security week in June 2017

Speakers:

Josh Greenbaum, Principle at Enterprise Applications Consulting

Chris Crone, SVP Strategic Communities and Relations at ASUG