Hey SAP Security wannabes,
Stop spending your time on old-school “SAP Security” trainings! Of course,
segregation of duties and access control are important but we are in 2016
now! All the top consulting companies now offer SAP Cyber Security services
and CISOs from Fortune 2000 companies want to know more about REAL
SAP Security, how hackers can compromise their systems and how to secure
Cyber-Security market is estimated 70 billion dollars and expected to grow 170
billion dollars by 2020. Taking into account that SAP is one of the most important
systems, the SAP Cyber-security will be a big part of this pie.
Before this course, this information was only available for a few companies. Now
you can learn it from one of the world-known experts in this area and extend your
knowledge in IT or SAP and be a much more competitive employee in the market.
For IT Security guys:
If you have no idea what SAP is but want to know why it's an important topic, this
course is for you! Here are some noteworthy things:
Interest in SAP security is growing exponentially and the numerous
attacks play a significant role in driving this interest. Take, for example,
the recent breaches revealed in SAP system of a government contractor
USIS. SAP systems and business-critical applications store the most critical
corporate data that can at some point be used for espionage, sabotage or
Analysts from different firms such as Gartner, IDC, 451Research, KuppingerCole and
Qoucirca agreed on the significant importance of ERP security tests and
lack of this functionality in traditional tools.
Top consulting companies have already included ERP security services in
But are you prepared for changes and do you have qualified expertise to
address growing ERP Security market?
I will start with the history of SAP Cyber Security and why and how SAP Cyber
security differs from IT Security. Then I will show the most critical risks for
organizations. After that we will be able to understand details of all the SAP
Systems such as ABAP or HANA and their vulnerabilities. To prove the importance,
I will also show examples of the real attacks on SAP Systems. Finally, we will
spend the rest of the time on learning how to secure SAP Systems from different
angles from secure coding and SoD to vulnerability management and threat
Learn why people started to care about SAP Cyber Security and how the situation has changed since 2006
I’ll show you how SAP Security differs from traditional IT security and what kind of unique features and myths are there
the most comprehensive list of risks affecting different organizations across all industries that use SAP solutions from ERP to Portal
Learn how the number of SAP vulnerabilities reached 3000th barrier and will continue to grow
The most important notes about ABAP platform, its architecture, vulnerabilities, and trends
The most important notes about J2EE platform, its architecture, vulnerabilities, and trend
The most important notes about SAP Business Objects platform, its architecture, vulnerabilities, and trends
The most important notes about SAP HANA platform security, its vulnerabilities, and trends
The most important notes about SAP Mobile platform, its vulnerabilities, and trends
If you still think that SAP is not a juicy target for cyberattacks and there were no incidents, sorry, I’ll disappoint you. You will learn lessons from 5 the most interesting examples
Learn The key takeaways from USIS Data breach - the biggest breach in the history of SAP Securityy
learn what SAP Security is within less than 5 minutes
Introduction to Segregation of Duties, SOX compliance, and access control
You will learn what kind of issues an uncontrolled customization of SAP programs can cause
this chapter will shed a light on how you can secure your systems from all issues step by step
Learn how you can easily start SAP Cyber Security audit and what’s the difference between SAP Pentesting and SAP Security Audit & Vulnerability Assessment
Today your system is secure, tomorrow it won’t. Everything is changing - how can you survive in this environment?
How to identify if your system was compromised and monitor malicious activity
Learn how to configure your workflow to automatically respond to attacks and quickly remediate vulnerabilities
Most important takeaways and lessons learnt
CTO of ERPScan. President of EAS-SEC.org, an organization focused on enterprise application cyber security. He has been recognized as R&D Professional of the Year by 2013 Hot Companies and Entrepreneur of the Year at 2013 Golden Bridge Awards. His expertise covers the security of enterprise business-critical software like ERP, CRM, SRM, and industry specific solutions from SAP and Oracle.
He has published 12 whitepapers on SAP security, and they include the golden award-winning “SAP Security in Figures” at the Global Excellence Awards by InfoSecurity Product Guide. It is the first research ever about the current situation of SAP security.
Alexander presented his research on SAP Cyber Security at more than 60 conferences held in more than 20 countries across all continents. He has held customized trainings for the CISOs of Fortune 2000 companies, including private trainings for SAP SE.
Alexander is engaged in creating ERPScan Security Monitoring Suite for SAP, an internationally acclaimed corporate solution, covering all areas of SAP security. His work with SAP Product Security Response Team started with finding vulnerabilities, with more than 200 issues discovered, it has led to an official partnership with SAP SE.