Sunny with a chance of...Insider Threats

Logo
Presented by

Shinesa Cambric, Fossil Group and JP Perez-Etchegoyen, Onapsis

About this talk

Protecting your crown jewels against insider threats SAP Applications are at the heart of many of the biggest organizations in the world, supporting the most critical business processes and holding the crown jewels of the business. Because of diverse factors that include complexity, criticality of the data, regulations and customizations, securing SAP Applications against threats is a difficult task, but can be achieved with the right level of engagement. Many companies rightfully focus on outsider threats but may be blind to risks and gaps that could leave their SAP system vulnerable from internal attacks. Join me to learn how to protect your organization's crown jewels from insider threats that could have a significant impact to areas including: ● Critical configurations, deployment of projects and new systems ● Keeping up with SAP security notes and patches, including those acknowledged as a critical US-CERT by the Cybersecurity and Infrastructure Security Agency (CISA) ● Protecting business processes from bad business outcomes I will provide a high level overview and steps for creating a baseline cybersecurity program that incorporates protecting SAP Business-Critical Applications from insider threats. Key learnings: 1 - Steps towards building a foundational SAP cybersecurity program that bridges the gap between your SAP Security, IT Security/SOC and SAP Operations teams. 2- How to consume threat intelligence from SAP that helps the organization prioritize and remediate risks to the business. 3- Top 3 things to do immediately to significantly improve the overall security posture of your organization.
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198883)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.