In this session you will learn:
- How and why it’s imperative to include SAP security in your overall cybersecurity strategy
- Fundamental concepts for SAP business-critical application cybersecurity & compliance
- Key strategies to maintain compliance and better mitigate risk across your SAP landscape
- Active and elevated SAP exploitation activity identified by Onapsis Research Labs
- CISA’s Catalog of Known Exploited Vulnerabilities and the SAP vulnerabilities highlighted as critically important to patch