If you want to access the webinar in Polish, please contact us: contact@lukardi.com
Webinar partner
Agenda
"Isn't SAP itself safe?"
It is, but it is up to the company running the system to decide what security methods it chooses
Authorizations - the first pillar of SAP security
How to find risks, what is SAP security policy, what are authorization conflicts, SoD, critical access. How (and why) to build a strong security policy based on authorization risks that relate to the business context.
Is there an ideal process for handling authorization?
Managing authorizations in systems is an ongoing process. We'll talk about why you can't just "buy security," and it takes resources to achieve (and maintain) the right results.
Technicalities - the second pillar of SAP security
In the thicket of hundreds and thousands of system parameters, kernel, databases, interfaces, there are some whose change from 0 to 1 can cause considerable security challenges. How do you reign in maintaining an adequate level of security for your SAP configuration?
Exploits at your fingertips
On the Internet we can find ready (or almost ready) exploits of known vulnerabilities. It turns out that to try to exploit a vulnerability the attacker in some cases does not need to have sophisticated knowledge (see script kiddie (link https://pl.wikipedia.org/wiki/Script_kiddie))
Real-time SAP monitoring
Integrating SAP with SIEM allows you to increase the visibility of SAP layer security events in internal SOCs. If you're mainly monitoring machine performance in your SIEM - perhaps that's not enough to raise the level of security
Migration to S/4HANA
Why not wait with S/4 security for a production launch? We will discuss why you should consider security already in the analysis phase, and at the latest in the construction of individual business functions.
About the speaker
Tomasz Jurgielewicz
Head of Security Department at Lukardi
At LUKARDI, he leads a team of SAP Security specialists, providing comprehensive services and tools to secure SAP systems. Experience in the areas of: identifying authorization conflicts and reorganizing authorization, identifying SAP vulnerabilities, and integrating SIEM solutions with SAP.
Unparalleled SAP licensing expertise
Our SAP experts know what has worked for other companies in audit negotiations and will share best practices with you during a live webinar.