Your SAP data security is more at risk than ever. Cybercriminals are taking advantage of this period of uncertainty, with remote working and overstretched IT teams increasing the risks of your data falling into the wrong hands.
Our virtual conference zooms in on this challenge with a range of sessions you can’t afford to miss, from simple steps you can take now to reduce your risks, to in-depth discussions on data privacy compliance.
Join industry experts and other companies like yours to find out how you can optimise your SAP security and keep your data safe.
Enjoy expert presentations from around the globe addressing different aspects of SAP security
Get access to everything after the event, and share it with colleagues
Ask the presenters your questions in live Q&A sessions
Find out how other organisations have solved challenges like yours
Be proactive. Protect your system in advance.
Are you compliant with legislation like GDPR, CCPA and POPIA?
Mitigate your risks in an agile SAP environment.
How can you scramble and mask identifiable information?
Who is looking at your sensitive SAP data?
How to keep your business agile and secure.
Can you keep your data safe?
Mask and monitor across both SAP and non-SAP systems.
Address additional business risks during this period, such as remote working.
The global economy is evolving more rapidly than ever before, with recent events putting the rate of change into overdrive. Organizations are now operating remotely, and the new ‘work from home’ paradigm is presenting a different set of challenges for security and compliance teams. Security needs to be prioritized, and how organizations react to these challenges will be scrutinized by shareholders, stakeholders and auditors alike. During this session, we will discuss the SAP security and compliance challenges organizations are facing in today’s ever-changing environment.
Many companies are still struggling with audit findings regarding critical access rights and segregation of duty breaches in their SAP environments. This is often caused by a lack of understanding of the SAP authorization concept, and can also be caused by the complexity of the SAP authorization concept itself. As many organizations will move to S/4HANA in the near future, an investment in SAP authorizations is required. It’s important to get to a clean state before a possible move to S/4HANA. In this session, a standard segregation of duties risk remediation and mitigation approach will be presented.
Despite the introduction of GDPR, a 2019 study by Varonis found that 53% of companies had over 1,000 sensitive files that were accessible to every employee. Managing Access Risk is thus something all companies need to focus on. Two of our customers; Forfarmers and Endeavor, will share with us their experiences with GRC through their testimonials. Find out how they managed to address their different compliance challenges in a cost-effective and user-friendly way.
How do you proactively monitor SAP threat vectors in highly complex & distributed environments? Given our complex IT environments in 2020, monitoring SAP’s risk and revenue-impacting events is crucial for business security, fraud, system health and operations. This session will focus on key areas such as: How organizations mature their SAP security poster, levels 0 through 4; Watching users and discovering unusual behavior; Tracking transfers and changes to sensitive data and Monitoring critical KPIs.
Lessons learned over the last two years of GDPR compliance has taught us that GDPR compliance is more like a marathon than a sprint. In this session, a UK manufacturing client will present their case study, sharing the multiple steps and project waves taken towards GDPR compliance. These included deleting data subjects, complying with GDPR’s Right to Access and the Right to be Forgotten and securing non-production through data masking.
The impact of the Coronavirus (“COVID-19”) has caused numerous disruptions to workplaces around the globe. With orders to “stay at home” in place across the United States and around the world, many organizations have implemented remote working arrangements in addition to virtual online business interactions, creating data security, privacy and compliance concerns. Compliance projects take time to plan and execute, and getting your data privacy plan in place is becoming more urgent than ever. During this session, we will discuss the California Consumer Privacy Act, or CCPA, and how companies should prepare for what lies ahead during the pandemic and when the pandemic is over. We will show you practical steps that you can take now to extend your CCPA compliance project to your SAP systems.
SAP Production systems typically have thousands of users accessing them. How confident are you in the controls you have in place to keep your sensitive data secure within these systems? In this session we look at common loopholes that hackers could find to get access to your sensitive data. They find ways to circumnavigate your security protocols from within the system. Let us show you ways to prevent this and how to identify where these hacks are taking place. One surefire way to reduce these risks is to shrink your attack surface by anonymizing data in your test SAP systems. Join us as we share these tips and more.
In the current climate, it is critical for your business to adapt to new challenges and minimise risk. With increasing remote access, it is now even more important to keep privacy of your SAP data top of mind. But what about the systems outside SAP? Michael de Boer from DATPROF will share some best practices that are available for systems other than SAP and how you can integrate with your SAP environment to give you better quality test data in the entire landscape.
It’s a reality that GRC practitioners are facing a continuous barrage of SAP access complexity, as well as regulatory and business change. Join us to learn more about Agile GRC: the mindset, techniques and tools employed by an emerging breed of agile GRC practitioners in organizations running SAP. Find out how solutions are enhancing business buy-in and accountability of risks. The session will cover emerging trends and their impact on the organization’s ability to manage their risk, how the agile revolution is impacting GRC practitioners and how to enhance your organization’s ‘Three lines of Defense’ with agile GRC.
Legislated data protection in South Africa, and specifically South Africa’s Protection of Personal Information Act 4 of 2013 (POPI Act), did not materialise as expected earlier this year, because of COVID-19. But data security during this global pandemic is even more important than ever, with digital and electronic operating systems replacing any form of physical business interaction. In this session, Hayley Levey will share how businesses, large or small, manage risk every day to be able to survive. COVID-19 is yet another example of how businesses can use this time to effectively implement long-term solutions to address their data compliance obligations, and avoid getting caught by any future curveballs.
Certifying to an internationally recognized standard such as ISO27001 is both a financial as well as a business investment. More than just a tick-box exercise, these programs not only reduce risks across multiple processes, they also bring a few unexpected benefits like winning new business, protecting your reputation, and satisfying audit requirements. In this talk, Johann Haefele (CISO) and Gericke Potgieter (Senior Data Analyst) will have a conversation about how a strong security culture will bring tangible benefits to your organization.
Two years into the General Data Protection Regulation (GDPR), experience has shown that many organizations have managed to understand and incorporate the GDPR / Privacy law basics into their IT environments, to demonstrate their compliance with the Regulation. However, many are currently struggling with more complex exercises. We will present KPMG’s better practices and technical solutions for managing your personal and sensitive data in the world of SAP, during this session.
An SAP landscape project (such as a migration or an upgrade) includes many key parts, and although it may not be the main reason for the project, security is key. During this session, Bobby Jagdev, an independent contractor, will share how they had to mask the non-production environment for a client to be GDPR compliant. He will also share his experience about how you can plan your SAP project to have security as part of your mindset.