{"id":5520,"global_id":"lukardi.com\/pl?id=5520","global_id_lineage":["lukardi.com\/pl?id=5520"],"author":"1","status":"publish","date":"2023-04-18 11:03:37","date_utc":"2023-04-18 09:03:37","modified":"2025-05-12 11:21:53","modified_utc":"2025-05-12 09:21:53","url":"https:\/\/lukardi.com\/pl\/webinar\/wyzwania-bezpieczenstwa-sap\/","rest_url":"https:\/\/lukardi.com\/pl\/wp-json\/tribe\/events\/v1\/events\/5520","title":"Wyzwania bezpiecze\u0144stwa SAP","description":"<h2>Wyzwania bezpiecze\u0144stwa SAP<\/h2>\n<p>\t\tPodczas webinaru na \u017cywo nasz ekspert opowiedzia\u0142 o tym:<\/p>\n<ul>\n<li>jakie s\u0105 g\u0142\u00f3wne wyzwania dotycz\u0105ce bezpiecze\u0144stwa SAP,<\/li>\n<li>gdzie znajduj\u0105 si\u0119 newralgiczne elementy utrzymania wysokiego poziomu bezpiecze\u0144stwa\u00a0<\/li>\n<li>oraz jakimi metodami mo\u017cna si\u0119 wspomaga\u0107 w osi\u0105gni\u0119ciu tego celu.<\/li>\n<\/ul>\n<figure><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/lukardi.com\/wp-content\/uploads\/2024\/07\/tomasz-jurgielewicz.jpg-150x150.webp\" alt=\"\" class=\"no-lazyload\" \/><\/figure>\n<h3>Prelegent &#8211; Tomasz Jurgielewicz<\/h3>\n<p>\t\t <script type='text\/javascript' src='https:\/\/app.getresponse.com\/view_webform_v2.js?u=wLbbi&webforms_id=zNzIM'><\/script><br \/>\n<\/p>\n<h2>Agenda<\/h2>\n<p>\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><rect width=\"32\" height=\"32\" rx=\"16\" fill=\"#EBF7F0\"><\/rect><path d=\"M17.2955 10.3636V22H15.8864V11.8409H15.8182L12.9773 13.7273V12.2955L15.8864 10.3636H17.2955Z\" fill=\"#009B47\"><\/path><\/svg>\t\t\t\t<\/p>\n<h3>\n\t\t\t\t\t\t\t&#8222;Czy SAP sam w sobie nie jest bezpieczny?&#8221;<br \/>\n\t\t\t\t\t<\/h3>\n<p>\n\t\t\t\t\t\tJest, ale to od firmy uruchamiaj\u0105cej system zale\u017cy jakie metody zabezpieczenia wybierze\t\t\t\t\t<\/p>\n<p>\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><rect x=\"0.5\" y=\"0.5\" width=\"31\" height=\"31\" rx=\"15.5\" fill=\"#EBF7F0\"><\/rect><rect x=\"0.5\" y=\"0.5\" width=\"31\" height=\"31\" rx=\"15.5\" stroke=\"#EBF7F0\"><\/rect><path d=\"M12.2045 22V20.9773L16.0455 16.7727C16.4962 16.2803 16.8674 15.8523 17.1591 15.4886C17.4508 15.1212 17.6667 14.7765 17.8068 14.4545C17.9508 14.1288 18.0227 13.7879 18.0227 13.4318C18.0227 13.0227 17.9242 12.6686 17.7273 12.3693C17.5341 12.0701 17.2689 11.839 16.9318 11.6761C16.5947 11.5133 16.2159 11.4318 15.7955 11.4318C15.3485 11.4318 14.9583 11.5246 14.625 11.7102C14.2955 11.892 14.0398 12.1477 13.858 12.4773C13.6799 12.8068 13.5909 13.1932 13.5909 13.6364H12.25C12.25 12.9545 12.4072 12.3561 12.7216 11.8409C13.036 11.3258 13.464 10.9242 14.0057 10.6364C14.5511 10.3485 15.1629 10.2045 15.8409 10.2045C16.5227 10.2045 17.1269 10.3485 17.6534 10.6364C18.1799 10.9242 18.5928 11.3125 18.892 11.8011C19.1913 12.2898 19.3409 12.8333 19.3409 13.4318C19.3409 13.8598 19.2633 14.2784 19.108 14.6875C18.9564 15.0928 18.6913 15.5455 18.3125 16.0455C17.9375 16.5417 17.4167 17.1477 16.75 17.8636L14.1364 20.6591V20.75H19.5455V22H12.2045Z\" fill=\"#009B47\"><\/path><\/svg>\t\t\t\t<\/p>\n<h3>\n\t\t\t\t\t\t\tAutoryzacje &#8211; pierwszy filar bezpiecze\u0144stwa SAP<br \/>\n\t\t\t\t\t<\/h3>\n<p>\n\t\t\t\t\t\tJak znale\u017a\u0107 ryzyka, czym jest polityka bezpiecze\u0144stwa SAP, co to s\u0105 konflikty uprawnie\u0144, SoD, krytyczne dost\u0119py. Jak (i po co) budowa\u0107 siln\u0105 polityk\u0119 bezpiecze\u0144stwa opart\u0105 o ryzyka autoryzacyjne odnosz\u0105ce si\u0119 do kontekstu biznesowego.\t\t\t\t\t<\/p>\n<p>\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><rect x=\"0.5\" y=\"0.5\" width=\"31\" height=\"31\" rx=\"15.5\" fill=\"#EBF7F0\"><\/rect><rect x=\"0.5\" y=\"0.5\" width=\"31\" height=\"31\" rx=\"15.5\" stroke=\"#EBF7F0\"><\/rect><path d=\"M15.6364 22.1591C14.8864 22.1591 14.2178 22.0303 13.6307 21.7727C13.0473 21.5152 12.5833 21.1572 12.2386 20.6989C11.8977 20.2367 11.7121 19.7008 11.6818 19.0909H13.1136C13.1439 19.4659 13.2727 19.7898 13.5 20.0625C13.7273 20.3314 14.0246 20.5398 14.392 20.6875C14.7595 20.8352 15.1667 20.9091 15.6136 20.9091C16.1136 20.9091 16.5568 20.822 16.9432 20.6477C17.3295 20.4735 17.6326 20.2311 17.8523 19.9205C18.072 19.6098 18.1818 19.25 18.1818 18.8409C18.1818 18.4129 18.0758 18.036 17.8636 17.7102C17.6515 17.3807 17.3409 17.1231 16.9318 16.9375C16.5227 16.7519 16.0227 16.6591 15.4318 16.6591H14.5V15.4091H15.4318C15.8939 15.4091 16.2992 15.3258 16.6477 15.1591C17 14.9924 17.2746 14.7576 17.4716 14.4545C17.6723 14.1515 17.7727 13.7955 17.7727 13.3864C17.7727 12.9924 17.6856 12.6496 17.5114 12.358C17.3371 12.0663 17.0909 11.839 16.7727 11.6761C16.4583 11.5133 16.0871 11.4318 15.6591 11.4318C15.2576 11.4318 14.8788 11.5057 14.5227 11.6534C14.1705 11.7973 13.8826 12.0076 13.6591 12.2841C13.4356 12.5568 13.3144 12.8864 13.2955 13.2727H11.9318C11.9545 12.6629 12.1383 12.1288 12.483 11.6705C12.8277 11.2083 13.2784 10.8485 13.8352 10.5909C14.3958 10.3333 15.0114 10.2045 15.6818 10.2045C16.4015 10.2045 17.0189 10.3504 17.5341 10.642C18.0492 10.9299 18.4451 11.3106 18.7216 11.7841C18.9981 12.2576 19.1364 12.7689 19.1364 13.3182C19.1364 13.9735 18.964 14.5322 18.6193 14.9943C18.2784 15.4564 17.8144 15.7765 17.2273 15.9545V16.0455C17.9621 16.1667 18.536 16.4792 18.9489 16.983C19.3617 17.483 19.5682 18.1023 19.5682 18.8409C19.5682 19.4735 19.3958 20.0417 19.0511 20.5455C18.7102 21.0455 18.2443 21.4394 17.6534 21.7273C17.0625 22.0152 16.3902 22.1591 15.6364 22.1591Z\" fill=\"#009B47\"><\/path><\/svg>\t\t\t\t<\/p>\n<h3>\n\t\t\t\t\t\t\tCzy istnieje idealny proces obs\u0142ugi autoryzacji?<br \/>\n\t\t\t\t\t<\/h3>\n<p>\n\t\t\t\t\t\tZarz\u0105dzanie autoryzacjami w systemach to proces ci\u0105g\u0142y. Opowiemy o tym dlaczego nie da si\u0119 po prostu &#8222;kupi\u0107 bezpiecze\u0144stwa&#8221;, a osi\u0105gni\u0119cie (i utrzymanie) odpowiednich rezultat\u00f3w wymaga odpowiednich zasob\u00f3w.\t\t\t\t\t<\/p>\n<p>\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><rect x=\"0.5\" y=\"0.5\" width=\"31\" height=\"31\" rx=\"15.5\" fill=\"#EBF7F0\"><\/rect><rect x=\"0.5\" y=\"0.5\" width=\"31\" height=\"31\" rx=\"15.5\" stroke=\"#EBF7F0\"><\/rect><path d=\"M11.4318 19.6136V18.4545L16.5455 10.3636H17.3864V12.1591H16.8182L12.9545 18.2727V18.3636H19.8409V19.6136H11.4318ZM16.9091 22V19.2614V18.7216V10.3636H18.25V22H16.9091Z\" fill=\"#009B47\"><\/path><\/svg>\t\t\t\t<\/p>\n<h3>\n\t\t\t\t\t\t\tTechnikalia &#8211; drugi filar bezpiecze\u0144stwa SAP<br \/>\n\t\t\t\t\t<\/h3>\n<p>\n\t\t\t\t\t\tW g\u0105szczu setek i tysi\u0119cy parametr\u00f3w systemu, kernela, baz danych, interfejs\u00f3w znajduj\u0105 si\u0119 takie, kt\u00f3rych zmiana z 0 na 1 mo\u017ce spowodowa\u0107 spore wyzwania bezpiecze\u0144stwa. Jak panowa\u0107 nad utrzymaniem odpowiedniego poziomu bezpiecze\u0144stwa konfiguracji SAP?\t\t\t\t\t<\/p>\n<p>\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><rect x=\"0.5\" y=\"0.5\" width=\"31\" height=\"31\" rx=\"15.5\" fill=\"#EBF7F0\"><\/rect><rect x=\"0.5\" y=\"0.5\" width=\"31\" height=\"31\" rx=\"15.5\" stroke=\"#EBF7F0\"><\/rect><path d=\"M15.8409 22.1591C15.1742 22.1591 14.5739 22.0265 14.0398 21.7614C13.5057 21.4962 13.0777 21.1326 12.7557 20.6705C12.4337 20.2083 12.2576 19.6818 12.2273 19.0909H13.5909C13.6439 19.6174 13.8826 20.053 14.3068 20.3977C14.7348 20.7386 15.2462 20.9091 15.8409 20.9091C16.3182 20.9091 16.7424 20.7973 17.1136 20.5739C17.4886 20.3504 17.7822 20.0436 17.9943 19.6534C18.2102 19.2595 18.3182 18.8144 18.3182 18.3182C18.3182 17.8106 18.2064 17.358 17.983 16.9602C17.7633 16.5587 17.4602 16.2424 17.0739 16.0114C16.6875 15.7803 16.2462 15.6629 15.75 15.6591C15.3939 15.6553 15.0284 15.7102 14.6534 15.8239C14.2784 15.9337 13.9697 16.0758 13.7273 16.25L12.4091 16.0909L13.1136 10.3636H19.1591V11.6136H14.2955L13.8864 15.0455H13.9545C14.1932 14.8561 14.4924 14.6989 14.8523 14.5739C15.2121 14.4489 15.5871 14.3864 15.9773 14.3864C16.6894 14.3864 17.3239 14.5568 17.8807 14.8977C18.4413 15.2348 18.8807 15.697 19.1989 16.2841C19.5208 16.8712 19.6818 17.5417 19.6818 18.2955C19.6818 19.0379 19.5152 19.7008 19.1818 20.2841C18.8523 20.8636 18.3977 21.322 17.8182 21.6591C17.2386 21.9924 16.5795 22.1591 15.8409 22.1591Z\" fill=\"#009B47\"><\/path><\/svg>\t\t\t\t<\/p>\n<h3>\n\t\t\t\t\t\t\tExploity na wyci\u0105gni\u0119cie r\u0119ki<br \/>\n\t\t\t\t\t<\/h3>\n<p>\n\t\t\t\t\t\tW Internecie znajdziemy gotowe (albo prawie gotowe) exploity znanych podatno\u015bci. Okazuje si\u0119, \u017ce by spr\u00f3bowa\u0107 wykorzysta\u0107 podatno\u015b\u0107 atakuj\u0105cy w niekt\u00f3rych przypadkach nie musi posiada\u0107 wyrafinowanej wiedzy (patrz script kiddie (link\u202fhttps:\/\/pl.wikipedia.org\/wiki\/Script_kiddie))\n\t\t\t\t\t<\/p>\n<p>\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><rect x=\"0.5\" y=\"0.5\" width=\"31\" height=\"31\" rx=\"15.5\" fill=\"#EBF7F0\"><\/rect><rect x=\"0.5\" y=\"0.5\" width=\"31\" height=\"31\" rx=\"15.5\" stroke=\"#EBF7F0\"><\/rect><path d=\"M16.0682 22.1591C15.5909 22.1515 15.1136 22.0606 14.6364 21.8864C14.1591 21.7121 13.7235 21.4186 13.3295 21.0057C12.9356 20.589 12.6193 20.0265 12.3807 19.3182C12.142 18.6061 12.0227 17.7121 12.0227 16.6364C12.0227 15.6061 12.1193 14.6932 12.3125 13.8977C12.5057 13.0985 12.786 12.4261 13.1534 11.8807C13.5208 11.3314 13.964 10.9148 14.483 10.6307C15.0057 10.3466 15.5947 10.2045 16.25 10.2045C16.9015 10.2045 17.4811 10.3352 17.9886 10.5966C18.5 10.8542 18.9167 11.214 19.2386 11.6761C19.5606 12.1383 19.7689 12.6705 19.8636 13.2727H18.4773C18.3485 12.75 18.0985 12.3163 17.7273 11.9716C17.3561 11.6269 16.8636 11.4545 16.25 11.4545C15.3485 11.4545 14.6383 11.8466 14.1193 12.6307C13.6042 13.4148 13.3447 14.5152 13.3409 15.9318H13.4318C13.6439 15.6098 13.8958 15.3352 14.1875 15.108C14.483 14.8769 14.8087 14.6989 15.1648 14.5739C15.5208 14.4489 15.8977 14.3864 16.2955 14.3864C16.9621 14.3864 17.572 14.553 18.125 14.8864C18.678 15.2159 19.1212 15.6723 19.4545 16.2557C19.7879 16.8352 19.9545 17.5 19.9545 18.25C19.9545 18.9697 19.7936 19.6288 19.4716 20.2273C19.1496 20.822 18.697 21.2955 18.1136 21.6477C17.5341 21.9962 16.8523 22.1667 16.0682 22.1591ZM16.0682 20.9091C16.5455 20.9091 16.9735 20.7898 17.3523 20.5511C17.7348 20.3125 18.036 19.9924 18.2557 19.5909C18.4792 19.1894 18.5909 18.7424 18.5909 18.25C18.5909 17.7689 18.483 17.3314 18.267 16.9375C18.0549 16.5398 17.7614 16.2235 17.3864 15.9886C17.0152 15.7538 16.5909 15.6364 16.1136 15.6364C15.7538 15.6364 15.4186 15.7083 15.108 15.8523C14.7973 15.9924 14.5246 16.1856 14.2898 16.4318C14.0587 16.678 13.8769 16.9602 13.7443 17.2784C13.6117 17.5928 13.5455 17.9242 13.5455 18.2727C13.5455 18.7348 13.6534 19.1667 13.8693 19.5682C14.089 19.9697 14.3883 20.2936 14.767 20.5398C15.1496 20.786 15.5833 20.9091 16.0682 20.9091Z\" fill=\"#009B47\"><\/path><\/svg>\t\t\t\t<\/p>\n<h3>\n\t\t\t\t\t\t\tMonitoring SAP w czasie rzeczywistym<br \/>\n\t\t\t\t\t<\/h3>\n<p>\n\t\t\t\t\t\tIntegracja SAP z SIEM pozwala na zwi\u0119kszenie widoczno\u015bci zdarze\u0144 bezpiecze\u0144stwa warstwy SAP w wewn\u0119trznych SOC. Je\u015bli w SIEM monitorujesz g\u0142\u00f3wnie performance maszyn &#8211; by\u0107 mo\u017ce jest to za ma\u0142o, by podnie\u015b\u0107 poziom bezpiecze\u0144stwa\t\t\t\t\t<\/p>\n<p>\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"32\" height=\"32\" viewBox=\"0 0 32 32\" fill=\"none\"><rect x=\"0.5\" y=\"0.5\" width=\"31\" height=\"31\" rx=\"15.5\" fill=\"#EBF7F0\"><\/rect><rect x=\"0.5\" y=\"0.5\" width=\"31\" height=\"31\" rx=\"15.5\" stroke=\"#EBF7F0\"><\/rect><path d=\"M12.5682 22L17.7727 11.7045V11.6136H11.7727V10.3636H19.2273V11.6818L14.0455 22H12.5682Z\" fill=\"#009B47\"><\/path><\/svg>\t\t\t\t<\/p>\n<h3>\n\t\t\t\t\t\t\tMigracja do S\/4HANA<br \/>\n\t\t\t\t\t<\/h3>\n<p>\n\t\t\t\t\t\tDlaczego nie warto czeka\u0107 z bezpiecze\u0144stwem S\/4 na uruchomienie produkcyjne? Om\u00f3wimy dlaczego warto uwzgl\u0119ni\u0107 bezpiecze\u0144stwo ju\u017c w fazie analizy, a najp\u00f3\u017aniej konstruowaniu poszczeg\u00f3lnych funkcji biznesowych.\t\t\t\t\t<\/p>\n<h2>O prelegencie<\/h2>\n<figure><img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/lukardi.com\/wp-content\/uploads\/2024\/07\/tomasz-jurgielewicz.jpg-150x150.webp\" alt=\"\" class=\"no-lazyload\" \/><\/figure>\n<h3>Tomasz Jurgielewicz<\/h3>\n<p>Head of Security Department w Lukardi<\/p>\n<p>W LUKARDI prowadzi zesp\u00f3\u0142 specjalist\u00f3w SAP Security, dostarczaj\u0105c kompleksowe us\u0142ugi i narz\u0119dzia do zabezpieczenia system\u00f3w SAP. Do\u015bwiadczenie w obszarze: identyfikacji konflikt\u00f3w uprawnie\u0144 i reorganizacji autoryzacji, \u00a0identyfikacji podatno\u015bci SAP, oraz integracji rozwi\u0105za\u0144 SIEM z SAP.<\/p>\n<h3>Niezr\u00f3wnana wiedza dotycz\u0105ca licencji SAP<\/h3>\n<p>Nasi eksperci SAP wiedz\u0105, co si\u0119 sprawdzi\u0142o dla innych sp\u00f3\u0142ek w negocjacjach audytowych i podziel\u0105 si\u0119 z Tob\u0105 najlepszymi praktykami podczas webinaru na \u017cywo.<\/p>\n<p>\t\t\t\t\t<a href=\"\/kontakt\"><br \/>\n\t\t\t\t\t\t\t\t\tSkontaktuj si\u0119 z nami<br \/>\n\t\t\t\t\t<\/a><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"174\" height=\"248\" src=\"https:\/\/lukardi.com\/wp-content\/uploads\/2024\/06\/linie.png\" alt=\"\" srcset=\"https:\/\/lukardi.com\/wp-content\/uploads\/2024\/06\/linie.png 174w, https:\/\/lukardi.com\/wp-content\/uploads\/2024\/06\/linie-8x12.png 8w\" sizes=\"(max-width: 174px) 100vw, 174px\" class=\"no-lazyload\" \/><\/p>","excerpt":"<p>Podczas webinaru na \u017cywo nasz ekspert opowiedzia\u0142 o tym: jakie s\u0105 g\u0142\u00f3wne wyzwania dotycz\u0105ce bezpiecze\u0144stwa SAP, gdzie znajduj\u0105 si\u0119 newralgiczne elementy utrzymania wysokiego poziomu bezpiecze\u0144stwa oraz jakimi metodami mo\u017cna si\u0119 wspomaga\u0107 w osi\u0105gni\u0119ciu tego celu.<\/p>","slug":"wyzwania-bezpieczenstwa-sap","image":false,"all_day":true,"start_date":"2023-04-18 00:00:00","start_date_details":{"year":"2023","month":"04","day":"18","hour":"00","minutes":"00","seconds":"00"},"end_date":"2023-04-18 23:59:59","end_date_details":{"year":"2023","month":"04","day":"18","hour":"23","minutes":"59","seconds":"59"},"utc_start_date":"2023-04-17 22:00:00","utc_start_date_details":{"year":"2023","month":"04","day":"17","hour":"22","minutes":"00","seconds":"00"},"utc_end_date":"2023-04-18 21:59:59","utc_end_date_details":{"year":"2023","month":"04","day":"18","hour":"21","minutes":"59","seconds":"59"},"timezone":"Europe\/Warsaw","timezone_abbr":"CEST","cost":"","cost_details":{"currency_symbol":"$","currency_code":"USD","currency_position":"prefix","values":[]},"website":"","show_map":false,"show_map_link":false,"hide_from_listings":false,"sticky":false,"featured":false,"categories":[{"name":"Online","slug":"online","term_group":0,"term_taxonomy_id":86,"taxonomy":"tribe_events_cat","description":"","parent":0,"count":12,"filter":"raw","id":86,"urls":{"self":"https:\/\/lukardi.com\/pl\/wp-json\/tribe\/events\/v1\/categories\/86","collection":"https:\/\/lukardi.com\/pl\/wp-json\/tribe\/events\/v1\/categories"}}],"tags":[],"venue":[],"organizer":[],"custom_fields":[],"json_ld":{"@context":"http:\/\/schema.org","@type":"Event","name":"Wyzwania bezpiecze\u0144stwa SAP","description":"&lt;p&gt;Podczas webinaru na \u017cywo nasz ekspert opowiedzia\u0142 o tym: jakie s\u0105 g\u0142\u00f3wne wyzwania dotycz\u0105ce bezpiecze\u0144stwa SAP, gdzie znajduj\u0105 si\u0119 newralgiczne elementy utrzymania wysokiego poziomu bezpiecze\u0144stwa oraz jakimi metodami mo\u017cna si\u0119 wspomaga\u0107 w osi\u0105gni\u0119ciu tego celu.&lt;\/p&gt;\\n","url":"https:\/\/lukardi.com\/pl\/webinar\/wyzwania-bezpieczenstwa-sap\/","eventAttendanceMode":"https:\/\/schema.org\/OfflineEventAttendanceMode","eventStatus":"https:\/\/schema.org\/EventScheduled","startDate":"2023-04-18T00:00:00+02:00","endDate":"2023-04-18T23:59:59+02:00","performer":"Organization"}}