Meet our Security & Compliance experts in person and learn everything you need to know about protecting your SAP systems first-hand. Every year we organize a series of events of our own or attend congresses to answer your questions.
We look forward to seeing you!
Our webinars offer you a live forum in which you can get the answers to your specific questions about the latest topics in SAP Security & Compliance without having to invest a lot of time.
Take advantage of our recommendations and find what you need to meet your particular requirements!
You are interested in one of the topics, but unfortunately the date does not fit? No problem, contact us directly: firstname.lastname@example.org
Or request our past webinars on demand.
This webinar provides insights into what structured security planning can look like. We share our experiences from SAP S/4HANA migration projects with you and show you where common pitfalls lie.
We repeatedly encounter companies that have put their SAP security and (re)organization of their authorization system on the back burner, or that repeat mistakes from the R/3 migration process. This can become a significant risk to the entire project.
With our best-practice examples, we support you in achieving optimum preparation for your SAP S/4HANA conversion: including tool-supported reduction of your ABAP source code, adapting your SAP roles without critical basis objects, and capturing the full intended performance gains in your SAP HANA database.
Topics of focus:
- Common pitfalls during SAP S/4HANA conversion
- Examples of structured security planning
- Model best practice projects for reliable, safe migration
Our audits are designed to help you determine your SAP landscape's actual risk exposure and pinpoint areas that are open to potential attacks. They include everything from your infrastructure and SAP system parameters to individual component configurations and authorizations.
Also if your company's migration to SAP HANA or S/4HANA is right around the corner. An audit offers an ideal solution for safeguarding your systems and taking all the necessary security measures before you start your transition.
Our approach is based on SAP's security guidelines, the recommendations of the German Federal Office for Information Security (BSI), and the information security standard DIN ISO 27001.
Topics of focus:
- Challenges, tools and proven methods
- Advantages of a root cause analysis and of the resulting risks for your company
- Quick check vs. audit vs. penetrationtest
- Our project approach at a glance
- Recommendations for the follow-up of an Audit