Topic
Are you responsible for the security of your SAP® systems or interested in learning more about the latest threats targeting SAP® environments?
Register now to discover the current threats affecting SAP® systems.
Which attack vectors and security vulnerabilities have led to breaches, ransomware attacks, and data theft in the SAP® landscape?
Prepare yourself with expert knowledge for today’s threat scenarios!
At the end of the online session, our experts will be available for questions and discussion.
Training dates
No dates are currently available.
Webcast content
Current threat vectors and security issues:
What new attack methods have led to breaches, ransomware attacks, and data theft in the SAP® ecosystem?Real-world experiences:
Fascinating reports from actual security incidents that reveal how hackers operate and the extortion tactics they use.Insights into the dark web:
How the underground network of cybercriminals is increasingly being used in recent attacks.SAP® security issues in detail:
Which common vulnerabilities in SAP® landscapes are responsible for breaches and security incidents?Practical protection measures:
How to defend against the latest threats and attack methods and secure your systems effectively.
Key topics
- Threats and vulnerabilities in the SAP® environment
- Attack methods used by APT groups and other cybercriminals
- Protection strategies for SAP® systems and SAP® Cloud
- Insights from real-world hacking cases and lessons learned
Your benefits
- Gain valuable best practices to secure your SAP® systems
- Learn how to detect and defend against current threats
- Benefit from expert knowledge and real-world case studies
Speakers
- Holger Stumm, log(2) oHG
- Jan-Patrick Falkenburg, TÜV TRUST IT
- Holger Hinzmann, TÜV TRUST IT
Information & Contact
A few days before the webinar, we will send you a MS Teams link for you to join.
For any questions, please contact veranstaltungen@tuv-austria.com
Register for a Webcast
"*" indicates required fields