The largest organizations in the world rely on SAP platforms to run their critical processes and keep their business crown jewels: financial information, customers data, intellectual property, credit cards, human resources salaries, sensitive materials, suppliers and more. Everything is there – and attackers know it. This presentation will highlight three attack vectors targeting SAP. - SAP Portal Header Authentication - Verb Tampering - Abuse of JAVA Core Services You will learn techniques to mitigate these threats.