SlideShare a Scribd company logo
PUBLIC
March 21, 2017
Lakshmi Hanspal, Chief Security Officer, SAP Ariba Trust Office
Joseph Gomez, Business Security Specialist, SAP Ariba Trust Office
Securing your Digital Transformation
Cybersecurity and You
2PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Simple Smart Secure
Cloud Security – Perception vs Reality
3PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Decision makers today have two fundamental choices to address their
business need
Business need:
Source globally, digitize collaboration,
execute business transactions efficiently
Networked solution
• Deploy application in cloud
• Invite partners to collaborate
throughout the process
• Exchange documents electronically
through business network
• Leverage integrated channels and
achieve transparency in invoicing
and payments
Traditional application
• Deploy application on-premise or
in-house
• Use phone/e-mail/letters/meetings
to collaborate
• Send and receive documents via
e-mail/fax/paper/EDI
• Leverage out-of-band channels for
invoicing and payments
Choice
4PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
A network approach is attractive, but companies need to protect their data
and their business relationships
• Achieve legal compliance such
as fulfilling data protection
requirements
• Ensure information relating to
individuals is protected in
storage and processing
• Store business data safely
• Transmit transactional data
securely
• Prohibit unauthorized access to
data
Protect personal data Protect trade secrets
5PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
• Securing the software development lifecycle
• Guarding your data against internal and external risks
• Access through least privilege/“need-to-know basis”
• Environment segmentation and demarcation
• Resiliency as core competency
• High availability, monitoring and business continuity
Trust Model for Cloud Providers
Cloud Providers should leverage a holistic, multi-dimensional approach to
establish and maintain state-of-the-art Security and Privacy.
Security
and Privacy
Technology
Processes
People
Scoping
6PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Business
Enablement
Ecosystem
Security
OperationsGovernance
Privacy
─ Data Protection
─ Regulations
─ Incident Response
─ Policies and
Standards
─ Compliance and
Audit
─ Risk Management
─ Training and
Awareness
─ Vulnerability
Management
─ Incident Management
and Response
─ Event Correlation
─ Emerging Threats
─ Customer
Collaterals
─ Contracts and
RFPs
─ Trend Analysis
─ Application
─ Data
─ Secure Development
─ Pen Testing
─ Solution Integration
Architecture
&
Engineering
─ Solution Architecture
─ Infrastructure and
Network
─ Security Engineering
─ Tools Engineering
Protecting Commerce in the Cloud – Build Secure, Run Secure, Be Secure
7PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Build Secure Products - SAP Ariba Secure Development Lifecycle
Ariba’s Secure Software Development to holistically integrate secure development principles in accordance with ISO 27034-1
1 2 3 4 5 6 7
Design Code Package Integrate Deploy
8PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Build Secure Products - Security Training
Information
Security
Fundamentals
Payment Card
Industry (PCI-
DSS) Basics
Secure
Programming
(OWASP Top
10)
Data
Protection
and Privacy
• Coming in 2017
Security
Expert
Curriculum
• Coming in 2017
9PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Build Secure Products - Software Security Champion Program
Requirements
• Minimum 3 to 5 years of
software development
experience
• Passion for Security “Thinks
like a Hacker”
• Willingness to take additional
security training
• Rotation every 6 months
between Primary and Backup
• Role activities should link to
10% – 15 % of the person’s
goals
Role
• Enforce the SAP Ariba SDL
• Become the Static and
Dynamic Tools Expert on
your team
• Be the advocate for
security within your core
development team
• Conduct Architecture
security analysis and
Threat modeling sessions
Responsibilities
• Attend monthly meetings with
larger Sec Champion/Product
Security Team
• Share gained Security
knowledge with other
Developers
• Act as the eyes and ears of
the Product Security team
10PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Run Secure - Security Risk Assessment
• 3rd Party Vendor review
• Data privacy impact
assessment
• Product Security Early
Engagement
Questionnaire
• Privacy and Legal
Review
• Threat Modeling
Activities
• Product Risk Profile Report
• Completed Engagement
Questionnaire
• Completed Privacy Impact
Assessment
• Certification Requirements
• List of third-party Software
• List of Applicable Laws and
Regulations
• Business Software
Requirements
• Data Flow Diagrams
• Threat Modeling Reports
•Risk Matrix for Threats
•Risk Mitigation Plan
•Threat Profile Report
Deliverables
11PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Run Secure - Vendor / Sub-Processor Oversight
Identify
SAP Ariba Cloud Unit to
identify all Vendors or Sub
Processors with access to
sensitive personal, business
or confidential information
via production environment.
Evaluate
Vendors and Sub
Processors are assessed by
the SAP Ariba Cloud Unit
based on potential security
threat, data breach or other
identified risks to the Cloud
Unit based on there
engagement.
Maintain
Update list when new
Vendors / Sub Processors
are contracted. Revaluate
Vendors / Sub Processors
based upon associated risk
ratings or at the time of
contract renewal.
12PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Run Secure - Third Party Risk Assessments
SA01 Has your site been audited by an outside agency (SysTrust, WebTrust, PCI-DSS,
SAS-70 Type II, BS7799, ISO or other)?
If so, how often do you get audited?
Provide audit report(s)
SA02 Do you perform internal audits?
If so, who conducts them and how often?
Provide audit report(s).
PP01 Does an Information Security Policy/Plan exist?
If so, please provide a copy.
PP02 Who is responsible for maintaining and enforcing this policy/plan?
PP03 Does an information classification and protection policy exist?
Security Assessments
Policy and Procedures
PS01 What is the location of the data center?
PS02 How is access to the building controlled?
PS03 Are any areas of the building open to the public?
PS04 Is there a 24x7 guard presence on site?
PS05 Do surveillance cameras monitor the building entrances and emergency exits?
PS06 Do surveillance cameras monitor other areas of the data center?
PS07 Describe the type of surveillance cameras used (CCTV, network cameras, etc.).
PS08 What type of authentication method is used for access to the building?
PS09 What type of authentication method is used for access to the data center?
PS10 Are staff required to wear photo identification badges at all times?
PS11 Are bags, boxes and other packages inspected prior to being permitted in the facility?
PS12 What work-around methods exist for access to the buildings in the event the above access methods fail?
PS13 Are guests/visitors permitted into the data center?
If so, what is the procedure for identification and authorization?
PS14 Are guests/visitors allowed unescorted access to any portion of the building?
PS15 What other physical security controls are in place for entrance into the data center?
PS16 Are systems in the data center protected by a cage to prevent unauthorized tampering?
PS17 Is the building shared with other tenants?
PS18 What controls are in place for receiving deliveries destined for the data center?
PS19 What controls are in place for the removal of equipment from the data center?
PS20 How many personnel have physical access to the systems?
Provide role of these individuals.
Physical Security Controls
Environmental Controls
EC01 What type of fire suppression is used within the data center?
EC02 What type of fire detection is used within the data center?
EC03 How is temperature and humidity monitored and controlled in the data center?
EC04 Are there redundant power supplies?
EC05 Are backup generators present to protect against long-term power failure?
If so, how long can operations be sustained on backup generators before refueling?
Do you have contracts for fuel supply in the event of an emergency?
EC06 Can building environmental systems be managed remotely?
IR01 Is there a Computer Security Incident Response Team (CSIRT) and plan in place?
IR02 Is the CSIRT plan tested on a regular basis?
If so, give the last date the plan was tested?
IR03 Do you have a policy for customer notification of security incidents?
If so, please provide a copy.
IR04 Describe the process for notifying customers in the event of a security incident?
IR05 What intrusion detection systems are currently in place?
IR06 How are alerts received and managed?
IR07 Have you had any successful attempts to compromise a system?
Any failed attempts?
IR08 How do you currently protect against denial of service attacks?
IR09 Do you conduct penetration testing of your environment on a regular basis?
IR10 Are IDS and firewall logs monitored and reviewed?
How often?
How long are IDS and firewall logs maintained?
Incident Response
13PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Run Secure - Third Party Risk Assessments
Disaster Recovery Controls
DR01 Is there a disaster recovery plan in place?
If so, please provide a copy.
DR02 What are your procedures for updating the plan?
DR03 What is the schedule for testing and training on the plan?
DR04 When was the last drill performed?
DR05 What critical systems are covered by the plan?
DR06 What systems are not covered by the plan?
DR07 What are the procedures for activating the plan?
DR08 How are inventories of critical systems maintained?
DR09 Are there formal backup procedures documented?
DR10 Describe your backup policy?
DR11 Do you have an offsite storage agreement in place?
If so, with whom?
DR12 Who has access to the backup tapes?
DR13 Is your site insured?
If so, with whom and describe the coverage.
OS01 Do you have 24/7 support? Please describe the escalation path. Is a live person available at
all hours?
OS02 How do you monitor your environment?
OS03 Describe your policy for delivering post mortem details after an outage.
OS04 Do you have multiple internet providers?
OS05 What are the terms of your SLA?
How do you measure your performance against it?
OS06 What are your maintenance windows?
OS07 Describe your procedures for notifying customers of downtime, both planned and
unplanned.
OS08 Do you support an encrypted interface with your systems like SSL?
OS09 Do you provide an online management tool for our account?
OS10 Please describe the technical capabilities of the on call staff.
Operational Support
LA01 Please describe your administrative/super user login procedures?
LA02 How is password security managed?
LA03 Please describe your password policy?
What is the minimum number of characters?
What level of complexity is required (letters, numbers, symbols, etc.)?
What is the password history?
How often must passwords be changed?
LA04 How are passwords stored and transmitted?
LA05 How are passwords communicated to users?
LA06 Do your systems support a lockout mechanism for failed login attempts?
If so, please describe.
LA07 Do you use a 2-factor authentication mechanism?
If so, please describe.
LA08 Is user access controlled by groups or roles?
If so, please describe.
LA09 Do procedures exist to disable access for terminated users?
LA10 Is there a procedure to periodically audit user accounts?
LA11 Are changes in user account privileges logged?
LA12 Do you have separation of duties when it comes to administrative access to your systems?
Logical Access Controls
Risk Management Controls
RM01 Is there a documented risk management plan with written procedures?
RM02 How often are risk assessments performed?
RM03 Please describe your risk assessment process?
14PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Run Secure - Advanced Secure Protocol and Ciphers
15PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Run Secure - EU General Data Protection Regulation (GDPR)
Replaces EU Data Protection Directive (1995) and harmonizes data privacy laws across Europe
Prep
Analysis &
Design Legal requirements: GDPR implementation
Jul Aug Sep Oct Nov Dec Q1/Q2
2016 2017 2018
May 25:
GDPR
effective
GDPR
compliance checks
Requirement Implementation
• Transparency & Accountability (Articles 5, 24, 30)
• Privacy Impact Assessment (Article 35)
• Data Inventory (Classification) and Documentation (Data
Flow; Encryption, Anonymization, Access control, Edit/ Read
Log etc.) for products and services processing customer data
• Gap Analysis, Mitigation and Non-compliance Risk
• Privacy by Design/ Impact Assessment
• Data Portability (30 days)/ Deletion/ Retention
• Data Breach (72 hr) involvement from DPA/ EDPB/ Individual
• Sub-processor Process and Inventory (Classification)
• Privacy Statement and Website (Consent for collecting PII
e.g. geo/IP address, non-interactively, Cookie Inventory,
Method of Tracking and Messaging)
• Training and Communications
• Certification - SSAE 16 SOC 2 Privacy, ISO 27018 (needs
27001)
• Record of processing activities (Article 30)
• Data Protection by design and default (Article 25)
• Special categories - enhancement (Article 9)
• Automated decision taking and profiling (Article 22)
• Data subject rights (Articles 15, 17, 20)
• Data breaches & notification (Articles 33, 34)
• Using service providers (Article 28)
• Data subject rights (Articles 15, 17, 20)
• Information notices (Articles 12, 13, 14)
• Consent (Articles 4, 6, 7, 8, 9)
16PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Be Secure - Protecting commerce in the cloud
2016 2017 2018
Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4
Upgrade Legacy to SHA-2 compliance Q1 2017
Advanced Front Door Customer Adoption
Ariba Network Encryption Q2 2017
Key Management – Software Vault Q3 2017
Q4 2016
Q2 2016 Upstream Data Encryption
Downstream Data Encryption Customer AdoptionQ4 2016
Customer Adoption
Key Management – Hardware Vault(HSM) Q4 2017
17PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Be Secure - Effective Risk Management
• Corporate decisions on how risk must be managed (strategy, principles, policies, standards etc.);
• Knowing how much risk the organization is willing to accept (risk tolerance/appetite);
• An understanding of who accepts risk on behalf of the organization (understanding and adherence);
• A method or process to understand the risk and how to deal with it (risk assessments, risk treatment);
• Knowing what needs to be protected (inventory, information classification);
• A method to effectively communicate responsibilities and obligations (escalate risks and decisions);
• A comprehensive and balanced set of requirements;
• A method and process for managing everyone’s expectations (sign off); and
• A common framework to put it all together.
Information security needs to be a continuously operating management system
18PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Data
Breach
Policy &
Compliance
Third
Party
App
Compromise
Cyber
Attacks
Infrastructure
Breach
Physical Security
Access Management
Configuration Management
Patching
Asset Management
SDLC
Penetration Testing
Encryption Between Tiers
Audit Findings
Policy/Procedure
Adherence/Gaps
Policy Exceptions
Training and Awareness
Sub-Proc. Data Center Audit Findings
Third Party MDPA/DPQ Outliers
Third Party Information System Security
Review Outliers
Encryption (Disk, Application)
Access Control
Data Leakage Protection
(DLP)
Deletion
SIEM/Event Detection
Vulnerability Assessment/Scans
Threat Intel
Containment Capability
Event Response
Be Secure – Risk Categories and Controls
19PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Be Secure – Building assurance via attestation
Code of Practice
ISO 27002
Foundation
Data Protection
Safe Harbor
BS 10012
Data Privacy
BDSG
EU Directive 95/46/EC
GDPR
Privacy
Security Best
Practice
Service
Delivery
ISO 20000
Business
Continuity
ISO 22300
Application
Security
ISO 27034
OWASP
Hardening
Guidelines
CIS, RAPID7,
SANs, ISO
CERT, NIST
Quality
Management
ISO 9000
ISO25010
Destruction of
Media
ISO 27040
Incident
Management
ISO 27035
Certification
ISO 22301, ISO 9001,
ISO27001, ISO 27018
Operations and
Compliance (including IP)
SOC 2, SOC 3
(AT 101 / ISAE 3000), IRAP
Financial Controls
SOX, SOC 1
(SSAE16 / ISAE 3402), PCI
Transparency
20PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
• Management accountable for committing (time, effort, funding,
resources, etc.) to data protection
• Management is accountable to select controls based on risk
acceptance and enforce those controls within the organisation
Management Commitment
• Demonstrate pro-active compliance with regulators
• Common framework for other standards, regulatory requirements
• Reduced liability risk
Compliance and Legal
Requirements
• Validate security and privacy practices and provide confidence in the
use of third parties
• Approach is consistent with other cloud companies
Building and Maintaining
Trust
• Increase awareness of Data Protection within the organisation
• Appropriate protection of cloud assets
• Efficiencies gained through repeatable processes for compliance
monitoring; Effectiveness of controls measured and reported;
Continual Improvement
Be Secure - Protecting Customer Personal and Business Data
21PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Protecting Customer Data - How can you help?
In case:
• You accidently send your data to the wrong recipient
• Your coworker notifies you of emailing sensitive data to the wrong recipient
• You notice a security issue in an application that may expose your data to others
• You are not sure if there is a security issue, but believe there could be one
Then:
• Contact ARIBA.SECOPS@SAP.COM with the relevant information IMMEDIATELY. We may be contractually
bound to report incidents to appropriate parties and timing is critical.
22PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Securing your Digital TransformationSAP Cloud Secure
Build Secure, Run Secure, Be Secure
Comprehensive Contracts
Privacy, Security Framework
Applicable local regulations
Cyber Defense
Multi Layers of defense
Holistic: Prevent, Detect,
Remediate
Independent Audits
Service Organization Report
Certifications
Secure Cloud Model
Holistic Approach
Secure Architecture
23PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ
Public
Please complete session survey
Locate Session Click Surveys Button Select Breakout Survey Rate Session
Thank you.
Contact information:
Lakshmi Hanspal Joseph Gomez
Chief Security Officer Business Security Specialist
SAP Ariba Trust Office SAP Ariba Trust Office
lakshmi.hanspal@sap.com joseph.gomez@sap.com
@lakshmihanspal
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company.
The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components
of other software vendors. National product specifications may vary.
These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated
companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are
set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty.
In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release
any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products,
and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The
information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various
risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements,
and they should not be relied upon in making purchasing decisions.
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company)
in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies.
See http://global.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices.
© 2017 SAP SE or an SAP affiliate company. All rights reserved.

More Related Content

What's hot

Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
Sqrrl
 
Microsoft threat modeling tool 2016
Microsoft threat modeling tool 2016Microsoft threat modeling tool 2016
Microsoft threat modeling tool 2016
Rihab Chebbah
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsYulian Slobodyan
 
Microsoft threat modeling tool 2016
Microsoft threat modeling tool 2016Microsoft threat modeling tool 2016
Microsoft threat modeling tool 2016
Kannan Ganapathy
 
SOC 2 and You
SOC 2 and YouSOC 2 and You
SOC 2 and You
Schellman & Company
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
Raleigh ISSA
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE - ATT&CKcon
 
Threat Modelling
Threat ModellingThreat Modelling
Overview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdfOverview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdf
Niloufer Tamboly
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Benjamin Ang
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
OCTF Industry Engagement
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020
Anton Chuvakin
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
Cristian Garcia G.
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
Tuan Phan
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
Steppa Cyber Security
 

What's hot (20)

Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Microsoft threat modeling tool 2016
Microsoft threat modeling tool 2016Microsoft threat modeling tool 2016
Microsoft threat modeling tool 2016
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
 
Microsoft threat modeling tool 2016
Microsoft threat modeling tool 2016Microsoft threat modeling tool 2016
Microsoft threat modeling tool 2016
 
SOC 2 and You
SOC 2 and YouSOC 2 and You
SOC 2 and You
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
 
Threat Modelling
Threat ModellingThreat Modelling
Threat Modelling
 
Overview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdfOverview of National Cybersecurity Strategy 2023.pdf
Overview of National Cybersecurity Strategy 2023.pdf
 
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
Cybersecurity in ASEAN and Singapore Columbia - Lecture for Columbia SIPA 202...
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
 
Information security management
Information security managementInformation security management
Information security management
 
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond ChapterNIST Cybersecurity Framework Intro for ISACA Richmond Chapter
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 

Viewers also liked

Transform Network Enablement Through Change Management
Transform Network Enablement Through Change ManagementTransform Network Enablement Through Change Management
Transform Network Enablement Through Change Management
SAP Ariba
 
Win New Business and Other Growth-Hacking Opportunities for Suppliers Using S...
Win New Business and Other Growth-Hacking Opportunities for Suppliers Using S...Win New Business and Other Growth-Hacking Opportunities for Suppliers Using S...
Win New Business and Other Growth-Hacking Opportunities for Suppliers Using S...
SAP Ariba
 
Panel Discussion with Latin America: Customer Experiences with SAP Ariba Solu...
Panel Discussion with Latin America: Customer Experiences with SAP Ariba Solu...Panel Discussion with Latin America: Customer Experiences with SAP Ariba Solu...
Panel Discussion with Latin America: Customer Experiences with SAP Ariba Solu...
SAP Ariba
 
Best Practices in Catalog Strategies
Best Practices in Catalog StrategiesBest Practices in Catalog Strategies
Best Practices in Catalog Strategies
SAP Ariba
 
Guided Buying Interactive Workshop
Guided Buying Interactive WorkshopGuided Buying Interactive Workshop
Guided Buying Interactive Workshop
SAP Ariba
 
Supplier Integration to Ariba Network: Cloud Integration Gateway
Supplier Integration to Ariba Network: Cloud Integration GatewaySupplier Integration to Ariba Network: Cloud Integration Gateway
Supplier Integration to Ariba Network: Cloud Integration Gateway
SAP Ariba
 
How to Talk to Your Suppliers About the Value of Joining Ariba Network
How to Talk to Your Suppliers About the Value of Joining Ariba NetworkHow to Talk to Your Suppliers About the Value of Joining Ariba Network
How to Talk to Your Suppliers About the Value of Joining Ariba Network
SAP Ariba
 
Supplier Management 101: Drive Spend Toward Preferred Suppliers and Reduce Risk
Supplier Management 101: Drive Spend Toward Preferred Suppliers and Reduce Risk Supplier Management 101: Drive Spend Toward Preferred Suppliers and Reduce Risk
Supplier Management 101: Drive Spend Toward Preferred Suppliers and Reduce Risk
SAP Ariba
 
Using E-Commerce to Automate Your Collaborative Business Transactions
Using E-Commerce to Automate Your Collaborative Business TransactionsUsing E-Commerce to Automate Your Collaborative Business Transactions
Using E-Commerce to Automate Your Collaborative Business Transactions
SAP Ariba
 
SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...
SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...
SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...
SAP Ariba
 
Globalizing Your Supplier Account
Globalizing Your Supplier AccountGlobalizing Your Supplier Account
Globalizing Your Supplier Account
SAP Ariba
 
Spot Buy – Your Custom B2B Marketplace
Spot Buy – Your Custom B2B MarketplaceSpot Buy – Your Custom B2B Marketplace
Spot Buy – Your Custom B2B Marketplace
SAP Ariba
 
When Procurement Meets Accounts Payable: The Power of Alignment
When Procurement Meets Accounts Payable: The Power of AlignmentWhen Procurement Meets Accounts Payable: The Power of Alignment
When Procurement Meets Accounts Payable: The Power of Alignment
SAP Ariba
 
What Your Spend Data Is Telling You and Why It’s Worth Listening
What Your Spend Data Is Telling You and Why It’s Worth ListeningWhat Your Spend Data Is Telling You and Why It’s Worth Listening
What Your Spend Data Is Telling You and Why It’s Worth Listening
SAP Ariba
 
Guided Buying: Exploration and Best Practices
Guided Buying: Exploration and Best PracticesGuided Buying: Exploration and Best Practices
Guided Buying: Exploration and Best Practices
SAP Ariba
 
Drive More Sales with Digital Customer Experience
Drive More Sales with Digital Customer ExperienceDrive More Sales with Digital Customer Experience
Drive More Sales with Digital Customer Experience
SAP Ariba
 
Accelerate Digital Transformation of Finance with Concur Solutions
Accelerate Digital Transformation of Finance with Concur Solutions Accelerate Digital Transformation of Finance with Concur Solutions
Accelerate Digital Transformation of Finance with Concur Solutions
SAP Ariba
 
How to Drive Source-to-Settle Value Through Process Automation AND Organizati...
How to Drive Source-to-Settle Value Through Process Automation AND Organizati...How to Drive Source-to-Settle Value Through Process Automation AND Organizati...
How to Drive Source-to-Settle Value Through Process Automation AND Organizati...
SAP Ariba
 
Unveiling an All-New Support Portal
Unveiling an All-New Support PortalUnveiling an All-New Support Portal
Unveiling an All-New Support Portal
SAP Ariba
 
Changing Dynamics: Driving Direct Material Sourcing and Supplier Collaboration
Changing Dynamics: Driving Direct Material Sourcing and Supplier CollaborationChanging Dynamics: Driving Direct Material Sourcing and Supplier Collaboration
Changing Dynamics: Driving Direct Material Sourcing and Supplier Collaboration
SAP Ariba
 

Viewers also liked (20)

Transform Network Enablement Through Change Management
Transform Network Enablement Through Change ManagementTransform Network Enablement Through Change Management
Transform Network Enablement Through Change Management
 
Win New Business and Other Growth-Hacking Opportunities for Suppliers Using S...
Win New Business and Other Growth-Hacking Opportunities for Suppliers Using S...Win New Business and Other Growth-Hacking Opportunities for Suppliers Using S...
Win New Business and Other Growth-Hacking Opportunities for Suppliers Using S...
 
Panel Discussion with Latin America: Customer Experiences with SAP Ariba Solu...
Panel Discussion with Latin America: Customer Experiences with SAP Ariba Solu...Panel Discussion with Latin America: Customer Experiences with SAP Ariba Solu...
Panel Discussion with Latin America: Customer Experiences with SAP Ariba Solu...
 
Best Practices in Catalog Strategies
Best Practices in Catalog StrategiesBest Practices in Catalog Strategies
Best Practices in Catalog Strategies
 
Guided Buying Interactive Workshop
Guided Buying Interactive WorkshopGuided Buying Interactive Workshop
Guided Buying Interactive Workshop
 
Supplier Integration to Ariba Network: Cloud Integration Gateway
Supplier Integration to Ariba Network: Cloud Integration GatewaySupplier Integration to Ariba Network: Cloud Integration Gateway
Supplier Integration to Ariba Network: Cloud Integration Gateway
 
How to Talk to Your Suppliers About the Value of Joining Ariba Network
How to Talk to Your Suppliers About the Value of Joining Ariba NetworkHow to Talk to Your Suppliers About the Value of Joining Ariba Network
How to Talk to Your Suppliers About the Value of Joining Ariba Network
 
Supplier Management 101: Drive Spend Toward Preferred Suppliers and Reduce Risk
Supplier Management 101: Drive Spend Toward Preferred Suppliers and Reduce Risk Supplier Management 101: Drive Spend Toward Preferred Suppliers and Reduce Risk
Supplier Management 101: Drive Spend Toward Preferred Suppliers and Reduce Risk
 
Using E-Commerce to Automate Your Collaborative Business Transactions
Using E-Commerce to Automate Your Collaborative Business TransactionsUsing E-Commerce to Automate Your Collaborative Business Transactions
Using E-Commerce to Automate Your Collaborative Business Transactions
 
SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...
SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...
SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...
 
Globalizing Your Supplier Account
Globalizing Your Supplier AccountGlobalizing Your Supplier Account
Globalizing Your Supplier Account
 
Spot Buy – Your Custom B2B Marketplace
Spot Buy – Your Custom B2B MarketplaceSpot Buy – Your Custom B2B Marketplace
Spot Buy – Your Custom B2B Marketplace
 
When Procurement Meets Accounts Payable: The Power of Alignment
When Procurement Meets Accounts Payable: The Power of AlignmentWhen Procurement Meets Accounts Payable: The Power of Alignment
When Procurement Meets Accounts Payable: The Power of Alignment
 
What Your Spend Data Is Telling You and Why It’s Worth Listening
What Your Spend Data Is Telling You and Why It’s Worth ListeningWhat Your Spend Data Is Telling You and Why It’s Worth Listening
What Your Spend Data Is Telling You and Why It’s Worth Listening
 
Guided Buying: Exploration and Best Practices
Guided Buying: Exploration and Best PracticesGuided Buying: Exploration and Best Practices
Guided Buying: Exploration and Best Practices
 
Drive More Sales with Digital Customer Experience
Drive More Sales with Digital Customer ExperienceDrive More Sales with Digital Customer Experience
Drive More Sales with Digital Customer Experience
 
Accelerate Digital Transformation of Finance with Concur Solutions
Accelerate Digital Transformation of Finance with Concur Solutions Accelerate Digital Transformation of Finance with Concur Solutions
Accelerate Digital Transformation of Finance with Concur Solutions
 
How to Drive Source-to-Settle Value Through Process Automation AND Organizati...
How to Drive Source-to-Settle Value Through Process Automation AND Organizati...How to Drive Source-to-Settle Value Through Process Automation AND Organizati...
How to Drive Source-to-Settle Value Through Process Automation AND Organizati...
 
Unveiling an All-New Support Portal
Unveiling an All-New Support PortalUnveiling an All-New Support Portal
Unveiling an All-New Support Portal
 
Changing Dynamics: Driving Direct Material Sourcing and Supplier Collaboration
Changing Dynamics: Driving Direct Material Sourcing and Supplier CollaborationChanging Dynamics: Driving Direct Material Sourcing and Supplier Collaboration
Changing Dynamics: Driving Direct Material Sourcing and Supplier Collaboration
 

Similar to Securing Your Digital Transformation: Cybersecurity and You

Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
SAP Ariba
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
SAP Customer Experience
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
SAP Analytics
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALRisi Avila
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the Business
Splunk
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
NowSecure
 
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
Splunk
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
Imperva
 
How to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from HackersHow to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from Hackers
Jeff Kayser
 
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
HPCC Systems
 
Fleet Optimization Buyer's Guide
Fleet Optimization Buyer's GuideFleet Optimization Buyer's Guide
Fleet Optimization Buyer's Guide
Curtis Serna
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk
 
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
TFT presentations Tomorrow's IT Service Future Today
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Splunk
 
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityImproving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & Security
Doug Copley
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
Jad Bejjani
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
Mike Kavis
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
RapidScale
 

Similar to Securing Your Digital Transformation: Cybersecurity and You (20)

Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Protect Your Customers Data from Cyberattacks
Protect Your Customers Data from CyberattacksProtect Your Customers Data from Cyberattacks
Protect Your Customers Data from Cyberattacks
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINAL
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the Business
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
SplunkLive! Munich 2018: Use Splunk for incident Response, Orchestration and ...
 
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
Splunk Discovery: Warsaw 2018 - Solve Your Security Challenges with Splunk En...
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
How to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from HackersHow to Protect Your Oracle Database from Hackers
How to Protect Your Oracle Database from Hackers
 
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
Leveraging HPCC Systems as Part of an Information Security, Privacy, and Comp...
 
Fleet Optimization Buyer's Guide
Fleet Optimization Buyer's GuideFleet Optimization Buyer's Guide
Fleet Optimization Buyer's Guide
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
#TFT14 Rajesh Gundurao and Firosh Poochaly, Technology Trends and Impact to ITIL
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
 
Improving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & SecurityImproving Cloud Visibility, Accountability & Security
Improving Cloud Visibility, Accountability & Security
 
Data Consult Managed Security Services
Data Consult Managed Security ServicesData Consult Managed Security Services
Data Consult Managed Security Services
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 

More from SAP Ariba

WINC. Australia and New Zealand: Collaborating with Direct Spend Suppliers - ...
WINC. Australia and New Zealand: Collaborating with Direct Spend Suppliers - ...WINC. Australia and New Zealand: Collaborating with Direct Spend Suppliers - ...
WINC. Australia and New Zealand: Collaborating with Direct Spend Suppliers - ...
SAP Ariba
 
Using E-Commerce to Integrate Your Collaborative Business Transactions - SID ...
Using E-Commerce to Integrate Your Collaborative Business Transactions - SID ...Using E-Commerce to Integrate Your Collaborative Business Transactions - SID ...
Using E-Commerce to Integrate Your Collaborative Business Transactions - SID ...
SAP Ariba
 
The Road to Strategic Finance: Characteristics of a Highly Effective Finance ...
The Road to Strategic Finance: Characteristics of a Highly Effective Finance ...The Road to Strategic Finance: Characteristics of a Highly Effective Finance ...
The Road to Strategic Finance: Characteristics of a Highly Effective Finance ...
SAP Ariba
 
The Future of How Work Gets Done: Are You Seeing the Big Picture? - SID 51473
The Future of How Work Gets Done: Are You Seeing the Big Picture? - SID 51473The Future of How Work Gets Done: Are You Seeing the Big Picture? - SID 51473
The Future of How Work Gets Done: Are You Seeing the Big Picture? - SID 51473
SAP Ariba
 
Simplify Supplier Risk Management Across Your Procurement Processes - SID 51538
Simplify Supplier Risk Management Across Your Procurement Processes - SID 51538Simplify Supplier Risk Management Across Your Procurement Processes - SID 51538
Simplify Supplier Risk Management Across Your Procurement Processes - SID 51538
SAP Ariba
 
SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...
SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...
SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...
SAP Ariba
 
Rio Tinto: Sourcing Multiple Spend Categories in a Single Platform - SID 51255
Rio Tinto: Sourcing Multiple Spend Categories in a Single Platform - SID 51255Rio Tinto: Sourcing Multiple Spend Categories in a Single Platform - SID 51255
Rio Tinto: Sourcing Multiple Spend Categories in a Single Platform - SID 51255
SAP Ariba
 
Preparing for Awesomeness: 12 Keys to Success - SID 51270
Preparing for Awesomeness: 12 Keys to Success - SID 51270Preparing for Awesomeness: 12 Keys to Success - SID 51270
Preparing for Awesomeness: 12 Keys to Success - SID 51270
SAP Ariba
 
Paperless Supply Chain Collaboration at DuluxGroup - SID 51254
Paperless Supply Chain Collaboration at DuluxGroup - SID 51254Paperless Supply Chain Collaboration at DuluxGroup - SID 51254
Paperless Supply Chain Collaboration at DuluxGroup - SID 51254
SAP Ariba
 
Leading Change and Diversity in Procurement - SID 51537
Leading Change and Diversity in Procurement - SID 51537Leading Change and Diversity in Procurement - SID 51537
Leading Change and Diversity in Procurement - SID 51537
SAP Ariba
 
Key Strategies for Procurement to Increase Savings and Contribute to Strategi...
Key Strategies for Procurement to Increase Savings and Contribute to Strategi...Key Strategies for Procurement to Increase Savings and Contribute to Strategi...
Key Strategies for Procurement to Increase Savings and Contribute to Strategi...
SAP Ariba
 
Redefining Procurement Transformation in the Digital Age - SID 51413
Redefining Procurement Transformation in the Digital Age - SID 51413Redefining Procurement Transformation in the Digital Age - SID 51413
Redefining Procurement Transformation in the Digital Age - SID 51413
SAP Ariba
 
Redefining Procurement Transformation in the Digital Age - SID 51413
Redefining Procurement Transformation in the Digital Age - SID 51413Redefining Procurement Transformation in the Digital Age - SID 51413
Redefining Procurement Transformation in the Digital Age - SID 51413
SAP Ariba
 
Recent Innovations in Sourcing, Contracts, and Spend Visibility - SID 51373
Recent Innovations in Sourcing, Contracts, and Spend Visibility - SID 51373Recent Innovations in Sourcing, Contracts, and Spend Visibility - SID 51373
Recent Innovations in Sourcing, Contracts, and Spend Visibility - SID 51373
SAP Ariba
 
More Ways to Buy Means More Savings: Maximizing the Value of SAP Ariba Soluti...
More Ways to Buy Means More Savings: Maximizing the Value of SAP Ariba Soluti...More Ways to Buy Means More Savings: Maximizing the Value of SAP Ariba Soluti...
More Ways to Buy Means More Savings: Maximizing the Value of SAP Ariba Soluti...
SAP Ariba
 
How to Get Mass Supplier Enablement: Transform Your Supplier Enablement Progr...
How to Get Mass Supplier Enablement: Transform Your Supplier Enablement Progr...How to Get Mass Supplier Enablement: Transform Your Supplier Enablement Progr...
How to Get Mass Supplier Enablement: Transform Your Supplier Enablement Progr...
SAP Ariba
 
How to Craft a World-Class Commerce Program with Your Suppliers - SID 51263
How to Craft a World-Class Commerce Program with Your Suppliers - SID 51263How to Craft a World-Class Commerce Program with Your Suppliers - SID 51263
How to Craft a World-Class Commerce Program with Your Suppliers - SID 51263
SAP Ariba
 
How Procurement Leaders Are Changing to Manage in the Digital Economy - SID 5...
How Procurement Leaders Are Changing to Manage in the Digital Economy - SID 5...How Procurement Leaders Are Changing to Manage in the Digital Economy - SID 5...
How Procurement Leaders Are Changing to Manage in the Digital Economy - SID 5...
SAP Ariba
 
How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...
How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...
How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...
SAP Ariba
 
How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...
How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...
How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...
SAP Ariba
 

More from SAP Ariba (20)

WINC. Australia and New Zealand: Collaborating with Direct Spend Suppliers - ...
WINC. Australia and New Zealand: Collaborating with Direct Spend Suppliers - ...WINC. Australia and New Zealand: Collaborating with Direct Spend Suppliers - ...
WINC. Australia and New Zealand: Collaborating with Direct Spend Suppliers - ...
 
Using E-Commerce to Integrate Your Collaborative Business Transactions - SID ...
Using E-Commerce to Integrate Your Collaborative Business Transactions - SID ...Using E-Commerce to Integrate Your Collaborative Business Transactions - SID ...
Using E-Commerce to Integrate Your Collaborative Business Transactions - SID ...
 
The Road to Strategic Finance: Characteristics of a Highly Effective Finance ...
The Road to Strategic Finance: Characteristics of a Highly Effective Finance ...The Road to Strategic Finance: Characteristics of a Highly Effective Finance ...
The Road to Strategic Finance: Characteristics of a Highly Effective Finance ...
 
The Future of How Work Gets Done: Are You Seeing the Big Picture? - SID 51473
The Future of How Work Gets Done: Are You Seeing the Big Picture? - SID 51473The Future of How Work Gets Done: Are You Seeing the Big Picture? - SID 51473
The Future of How Work Gets Done: Are You Seeing the Big Picture? - SID 51473
 
Simplify Supplier Risk Management Across Your Procurement Processes - SID 51538
Simplify Supplier Risk Management Across Your Procurement Processes - SID 51538Simplify Supplier Risk Management Across Your Procurement Processes - SID 51538
Simplify Supplier Risk Management Across Your Procurement Processes - SID 51538
 
SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...
SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...
SAP Ariba Solutions Realized: Stories of Effective Implementation and Forward...
 
Rio Tinto: Sourcing Multiple Spend Categories in a Single Platform - SID 51255
Rio Tinto: Sourcing Multiple Spend Categories in a Single Platform - SID 51255Rio Tinto: Sourcing Multiple Spend Categories in a Single Platform - SID 51255
Rio Tinto: Sourcing Multiple Spend Categories in a Single Platform - SID 51255
 
Preparing for Awesomeness: 12 Keys to Success - SID 51270
Preparing for Awesomeness: 12 Keys to Success - SID 51270Preparing for Awesomeness: 12 Keys to Success - SID 51270
Preparing for Awesomeness: 12 Keys to Success - SID 51270
 
Paperless Supply Chain Collaboration at DuluxGroup - SID 51254
Paperless Supply Chain Collaboration at DuluxGroup - SID 51254Paperless Supply Chain Collaboration at DuluxGroup - SID 51254
Paperless Supply Chain Collaboration at DuluxGroup - SID 51254
 
Leading Change and Diversity in Procurement - SID 51537
Leading Change and Diversity in Procurement - SID 51537Leading Change and Diversity in Procurement - SID 51537
Leading Change and Diversity in Procurement - SID 51537
 
Key Strategies for Procurement to Increase Savings and Contribute to Strategi...
Key Strategies for Procurement to Increase Savings and Contribute to Strategi...Key Strategies for Procurement to Increase Savings and Contribute to Strategi...
Key Strategies for Procurement to Increase Savings and Contribute to Strategi...
 
Redefining Procurement Transformation in the Digital Age - SID 51413
Redefining Procurement Transformation in the Digital Age - SID 51413Redefining Procurement Transformation in the Digital Age - SID 51413
Redefining Procurement Transformation in the Digital Age - SID 51413
 
Redefining Procurement Transformation in the Digital Age - SID 51413
Redefining Procurement Transformation in the Digital Age - SID 51413Redefining Procurement Transformation in the Digital Age - SID 51413
Redefining Procurement Transformation in the Digital Age - SID 51413
 
Recent Innovations in Sourcing, Contracts, and Spend Visibility - SID 51373
Recent Innovations in Sourcing, Contracts, and Spend Visibility - SID 51373Recent Innovations in Sourcing, Contracts, and Spend Visibility - SID 51373
Recent Innovations in Sourcing, Contracts, and Spend Visibility - SID 51373
 
More Ways to Buy Means More Savings: Maximizing the Value of SAP Ariba Soluti...
More Ways to Buy Means More Savings: Maximizing the Value of SAP Ariba Soluti...More Ways to Buy Means More Savings: Maximizing the Value of SAP Ariba Soluti...
More Ways to Buy Means More Savings: Maximizing the Value of SAP Ariba Soluti...
 
How to Get Mass Supplier Enablement: Transform Your Supplier Enablement Progr...
How to Get Mass Supplier Enablement: Transform Your Supplier Enablement Progr...How to Get Mass Supplier Enablement: Transform Your Supplier Enablement Progr...
How to Get Mass Supplier Enablement: Transform Your Supplier Enablement Progr...
 
How to Craft a World-Class Commerce Program with Your Suppliers - SID 51263
How to Craft a World-Class Commerce Program with Your Suppliers - SID 51263How to Craft a World-Class Commerce Program with Your Suppliers - SID 51263
How to Craft a World-Class Commerce Program with Your Suppliers - SID 51263
 
How Procurement Leaders Are Changing to Manage in the Digital Economy - SID 5...
How Procurement Leaders Are Changing to Manage in the Digital Economy - SID 5...How Procurement Leaders Are Changing to Manage in the Digital Economy - SID 5...
How Procurement Leaders Are Changing to Manage in the Digital Economy - SID 5...
 
How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...
How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...
How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...
 
How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...
How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...
How Do Our Most Successful Customers Do It? The Must-Have Ingredients for Val...
 

Recently uploaded

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
Sam H
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 

Recently uploaded (20)

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Unveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdfUnveiling the Secrets How Does Generative AI Work.pdf
Unveiling the Secrets How Does Generative AI Work.pdf
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 

Securing Your Digital Transformation: Cybersecurity and You

  • 1. PUBLIC March 21, 2017 Lakshmi Hanspal, Chief Security Officer, SAP Ariba Trust Office Joseph Gomez, Business Security Specialist, SAP Ariba Trust Office Securing your Digital Transformation Cybersecurity and You
  • 2. 2PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Simple Smart Secure Cloud Security – Perception vs Reality
  • 3. 3PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Decision makers today have two fundamental choices to address their business need Business need: Source globally, digitize collaboration, execute business transactions efficiently Networked solution • Deploy application in cloud • Invite partners to collaborate throughout the process • Exchange documents electronically through business network • Leverage integrated channels and achieve transparency in invoicing and payments Traditional application • Deploy application on-premise or in-house • Use phone/e-mail/letters/meetings to collaborate • Send and receive documents via e-mail/fax/paper/EDI • Leverage out-of-band channels for invoicing and payments Choice
  • 4. 4PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public A network approach is attractive, but companies need to protect their data and their business relationships • Achieve legal compliance such as fulfilling data protection requirements • Ensure information relating to individuals is protected in storage and processing • Store business data safely • Transmit transactional data securely • Prohibit unauthorized access to data Protect personal data Protect trade secrets
  • 5. 5PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public • Securing the software development lifecycle • Guarding your data against internal and external risks • Access through least privilege/“need-to-know basis” • Environment segmentation and demarcation • Resiliency as core competency • High availability, monitoring and business continuity Trust Model for Cloud Providers Cloud Providers should leverage a holistic, multi-dimensional approach to establish and maintain state-of-the-art Security and Privacy. Security and Privacy Technology Processes People Scoping
  • 6. 6PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Business Enablement Ecosystem Security OperationsGovernance Privacy ─ Data Protection ─ Regulations ─ Incident Response ─ Policies and Standards ─ Compliance and Audit ─ Risk Management ─ Training and Awareness ─ Vulnerability Management ─ Incident Management and Response ─ Event Correlation ─ Emerging Threats ─ Customer Collaterals ─ Contracts and RFPs ─ Trend Analysis ─ Application ─ Data ─ Secure Development ─ Pen Testing ─ Solution Integration Architecture & Engineering ─ Solution Architecture ─ Infrastructure and Network ─ Security Engineering ─ Tools Engineering Protecting Commerce in the Cloud – Build Secure, Run Secure, Be Secure
  • 7. 7PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Build Secure Products - SAP Ariba Secure Development Lifecycle Ariba’s Secure Software Development to holistically integrate secure development principles in accordance with ISO 27034-1 1 2 3 4 5 6 7 Design Code Package Integrate Deploy
  • 8. 8PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Build Secure Products - Security Training Information Security Fundamentals Payment Card Industry (PCI- DSS) Basics Secure Programming (OWASP Top 10) Data Protection and Privacy • Coming in 2017 Security Expert Curriculum • Coming in 2017
  • 9. 9PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Build Secure Products - Software Security Champion Program Requirements • Minimum 3 to 5 years of software development experience • Passion for Security “Thinks like a Hacker” • Willingness to take additional security training • Rotation every 6 months between Primary and Backup • Role activities should link to 10% – 15 % of the person’s goals Role • Enforce the SAP Ariba SDL • Become the Static and Dynamic Tools Expert on your team • Be the advocate for security within your core development team • Conduct Architecture security analysis and Threat modeling sessions Responsibilities • Attend monthly meetings with larger Sec Champion/Product Security Team • Share gained Security knowledge with other Developers • Act as the eyes and ears of the Product Security team
  • 10. 10PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Run Secure - Security Risk Assessment • 3rd Party Vendor review • Data privacy impact assessment • Product Security Early Engagement Questionnaire • Privacy and Legal Review • Threat Modeling Activities • Product Risk Profile Report • Completed Engagement Questionnaire • Completed Privacy Impact Assessment • Certification Requirements • List of third-party Software • List of Applicable Laws and Regulations • Business Software Requirements • Data Flow Diagrams • Threat Modeling Reports •Risk Matrix for Threats •Risk Mitigation Plan •Threat Profile Report Deliverables
  • 11. 11PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Run Secure - Vendor / Sub-Processor Oversight Identify SAP Ariba Cloud Unit to identify all Vendors or Sub Processors with access to sensitive personal, business or confidential information via production environment. Evaluate Vendors and Sub Processors are assessed by the SAP Ariba Cloud Unit based on potential security threat, data breach or other identified risks to the Cloud Unit based on there engagement. Maintain Update list when new Vendors / Sub Processors are contracted. Revaluate Vendors / Sub Processors based upon associated risk ratings or at the time of contract renewal.
  • 12. 12PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Run Secure - Third Party Risk Assessments SA01 Has your site been audited by an outside agency (SysTrust, WebTrust, PCI-DSS, SAS-70 Type II, BS7799, ISO or other)? If so, how often do you get audited? Provide audit report(s) SA02 Do you perform internal audits? If so, who conducts them and how often? Provide audit report(s). PP01 Does an Information Security Policy/Plan exist? If so, please provide a copy. PP02 Who is responsible for maintaining and enforcing this policy/plan? PP03 Does an information classification and protection policy exist? Security Assessments Policy and Procedures PS01 What is the location of the data center? PS02 How is access to the building controlled? PS03 Are any areas of the building open to the public? PS04 Is there a 24x7 guard presence on site? PS05 Do surveillance cameras monitor the building entrances and emergency exits? PS06 Do surveillance cameras monitor other areas of the data center? PS07 Describe the type of surveillance cameras used (CCTV, network cameras, etc.). PS08 What type of authentication method is used for access to the building? PS09 What type of authentication method is used for access to the data center? PS10 Are staff required to wear photo identification badges at all times? PS11 Are bags, boxes and other packages inspected prior to being permitted in the facility? PS12 What work-around methods exist for access to the buildings in the event the above access methods fail? PS13 Are guests/visitors permitted into the data center? If so, what is the procedure for identification and authorization? PS14 Are guests/visitors allowed unescorted access to any portion of the building? PS15 What other physical security controls are in place for entrance into the data center? PS16 Are systems in the data center protected by a cage to prevent unauthorized tampering? PS17 Is the building shared with other tenants? PS18 What controls are in place for receiving deliveries destined for the data center? PS19 What controls are in place for the removal of equipment from the data center? PS20 How many personnel have physical access to the systems? Provide role of these individuals. Physical Security Controls Environmental Controls EC01 What type of fire suppression is used within the data center? EC02 What type of fire detection is used within the data center? EC03 How is temperature and humidity monitored and controlled in the data center? EC04 Are there redundant power supplies? EC05 Are backup generators present to protect against long-term power failure? If so, how long can operations be sustained on backup generators before refueling? Do you have contracts for fuel supply in the event of an emergency? EC06 Can building environmental systems be managed remotely? IR01 Is there a Computer Security Incident Response Team (CSIRT) and plan in place? IR02 Is the CSIRT plan tested on a regular basis? If so, give the last date the plan was tested? IR03 Do you have a policy for customer notification of security incidents? If so, please provide a copy. IR04 Describe the process for notifying customers in the event of a security incident? IR05 What intrusion detection systems are currently in place? IR06 How are alerts received and managed? IR07 Have you had any successful attempts to compromise a system? Any failed attempts? IR08 How do you currently protect against denial of service attacks? IR09 Do you conduct penetration testing of your environment on a regular basis? IR10 Are IDS and firewall logs monitored and reviewed? How often? How long are IDS and firewall logs maintained? Incident Response
  • 13. 13PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Run Secure - Third Party Risk Assessments Disaster Recovery Controls DR01 Is there a disaster recovery plan in place? If so, please provide a copy. DR02 What are your procedures for updating the plan? DR03 What is the schedule for testing and training on the plan? DR04 When was the last drill performed? DR05 What critical systems are covered by the plan? DR06 What systems are not covered by the plan? DR07 What are the procedures for activating the plan? DR08 How are inventories of critical systems maintained? DR09 Are there formal backup procedures documented? DR10 Describe your backup policy? DR11 Do you have an offsite storage agreement in place? If so, with whom? DR12 Who has access to the backup tapes? DR13 Is your site insured? If so, with whom and describe the coverage. OS01 Do you have 24/7 support? Please describe the escalation path. Is a live person available at all hours? OS02 How do you monitor your environment? OS03 Describe your policy for delivering post mortem details after an outage. OS04 Do you have multiple internet providers? OS05 What are the terms of your SLA? How do you measure your performance against it? OS06 What are your maintenance windows? OS07 Describe your procedures for notifying customers of downtime, both planned and unplanned. OS08 Do you support an encrypted interface with your systems like SSL? OS09 Do you provide an online management tool for our account? OS10 Please describe the technical capabilities of the on call staff. Operational Support LA01 Please describe your administrative/super user login procedures? LA02 How is password security managed? LA03 Please describe your password policy? What is the minimum number of characters? What level of complexity is required (letters, numbers, symbols, etc.)? What is the password history? How often must passwords be changed? LA04 How are passwords stored and transmitted? LA05 How are passwords communicated to users? LA06 Do your systems support a lockout mechanism for failed login attempts? If so, please describe. LA07 Do you use a 2-factor authentication mechanism? If so, please describe. LA08 Is user access controlled by groups or roles? If so, please describe. LA09 Do procedures exist to disable access for terminated users? LA10 Is there a procedure to periodically audit user accounts? LA11 Are changes in user account privileges logged? LA12 Do you have separation of duties when it comes to administrative access to your systems? Logical Access Controls Risk Management Controls RM01 Is there a documented risk management plan with written procedures? RM02 How often are risk assessments performed? RM03 Please describe your risk assessment process?
  • 14. 14PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Run Secure - Advanced Secure Protocol and Ciphers
  • 15. 15PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Run Secure - EU General Data Protection Regulation (GDPR) Replaces EU Data Protection Directive (1995) and harmonizes data privacy laws across Europe Prep Analysis & Design Legal requirements: GDPR implementation Jul Aug Sep Oct Nov Dec Q1/Q2 2016 2017 2018 May 25: GDPR effective GDPR compliance checks Requirement Implementation • Transparency & Accountability (Articles 5, 24, 30) • Privacy Impact Assessment (Article 35) • Data Inventory (Classification) and Documentation (Data Flow; Encryption, Anonymization, Access control, Edit/ Read Log etc.) for products and services processing customer data • Gap Analysis, Mitigation and Non-compliance Risk • Privacy by Design/ Impact Assessment • Data Portability (30 days)/ Deletion/ Retention • Data Breach (72 hr) involvement from DPA/ EDPB/ Individual • Sub-processor Process and Inventory (Classification) • Privacy Statement and Website (Consent for collecting PII e.g. geo/IP address, non-interactively, Cookie Inventory, Method of Tracking and Messaging) • Training and Communications • Certification - SSAE 16 SOC 2 Privacy, ISO 27018 (needs 27001) • Record of processing activities (Article 30) • Data Protection by design and default (Article 25) • Special categories - enhancement (Article 9) • Automated decision taking and profiling (Article 22) • Data subject rights (Articles 15, 17, 20) • Data breaches & notification (Articles 33, 34) • Using service providers (Article 28) • Data subject rights (Articles 15, 17, 20) • Information notices (Articles 12, 13, 14) • Consent (Articles 4, 6, 7, 8, 9)
  • 16. 16PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Be Secure - Protecting commerce in the cloud 2016 2017 2018 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Upgrade Legacy to SHA-2 compliance Q1 2017 Advanced Front Door Customer Adoption Ariba Network Encryption Q2 2017 Key Management – Software Vault Q3 2017 Q4 2016 Q2 2016 Upstream Data Encryption Downstream Data Encryption Customer AdoptionQ4 2016 Customer Adoption Key Management – Hardware Vault(HSM) Q4 2017
  • 17. 17PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Be Secure - Effective Risk Management • Corporate decisions on how risk must be managed (strategy, principles, policies, standards etc.); • Knowing how much risk the organization is willing to accept (risk tolerance/appetite); • An understanding of who accepts risk on behalf of the organization (understanding and adherence); • A method or process to understand the risk and how to deal with it (risk assessments, risk treatment); • Knowing what needs to be protected (inventory, information classification); • A method to effectively communicate responsibilities and obligations (escalate risks and decisions); • A comprehensive and balanced set of requirements; • A method and process for managing everyone’s expectations (sign off); and • A common framework to put it all together. Information security needs to be a continuously operating management system
  • 18. 18PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Data Breach Policy & Compliance Third Party App Compromise Cyber Attacks Infrastructure Breach Physical Security Access Management Configuration Management Patching Asset Management SDLC Penetration Testing Encryption Between Tiers Audit Findings Policy/Procedure Adherence/Gaps Policy Exceptions Training and Awareness Sub-Proc. Data Center Audit Findings Third Party MDPA/DPQ Outliers Third Party Information System Security Review Outliers Encryption (Disk, Application) Access Control Data Leakage Protection (DLP) Deletion SIEM/Event Detection Vulnerability Assessment/Scans Threat Intel Containment Capability Event Response Be Secure – Risk Categories and Controls
  • 19. 19PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Be Secure – Building assurance via attestation Code of Practice ISO 27002 Foundation Data Protection Safe Harbor BS 10012 Data Privacy BDSG EU Directive 95/46/EC GDPR Privacy Security Best Practice Service Delivery ISO 20000 Business Continuity ISO 22300 Application Security ISO 27034 OWASP Hardening Guidelines CIS, RAPID7, SANs, ISO CERT, NIST Quality Management ISO 9000 ISO25010 Destruction of Media ISO 27040 Incident Management ISO 27035 Certification ISO 22301, ISO 9001, ISO27001, ISO 27018 Operations and Compliance (including IP) SOC 2, SOC 3 (AT 101 / ISAE 3000), IRAP Financial Controls SOX, SOC 1 (SSAE16 / ISAE 3402), PCI Transparency
  • 20. 20PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public • Management accountable for committing (time, effort, funding, resources, etc.) to data protection • Management is accountable to select controls based on risk acceptance and enforce those controls within the organisation Management Commitment • Demonstrate pro-active compliance with regulators • Common framework for other standards, regulatory requirements • Reduced liability risk Compliance and Legal Requirements • Validate security and privacy practices and provide confidence in the use of third parties • Approach is consistent with other cloud companies Building and Maintaining Trust • Increase awareness of Data Protection within the organisation • Appropriate protection of cloud assets • Efficiencies gained through repeatable processes for compliance monitoring; Effectiveness of controls measured and reported; Continual Improvement Be Secure - Protecting Customer Personal and Business Data
  • 21. 21PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Protecting Customer Data - How can you help? In case: • You accidently send your data to the wrong recipient • Your coworker notifies you of emailing sensitive data to the wrong recipient • You notice a security issue in an application that may expose your data to others • You are not sure if there is a security issue, but believe there could be one Then: • Contact ARIBA.SECOPS@SAP.COM with the relevant information IMMEDIATELY. We may be contractually bound to report incidents to appropriate parties and timing is critical.
  • 22. 22PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Securing your Digital TransformationSAP Cloud Secure Build Secure, Run Secure, Be Secure Comprehensive Contracts Privacy, Security Framework Applicable local regulations Cyber Defense Multi Layers of defense Holistic: Prevent, Detect, Remediate Independent Audits Service Organization Report Certifications Secure Cloud Model Holistic Approach Secure Architecture
  • 23. 23PUBLIC© 2017 SAP SE or an SAP affiliate company. All rights reserved. ǀ Public Please complete session survey Locate Session Click Surveys Button Select Breakout Survey Rate Session
  • 24. Thank you. Contact information: Lakshmi Hanspal Joseph Gomez Chief Security Officer Business Security Specialist SAP Ariba Trust Office SAP Ariba Trust Office lakshmi.hanspal@sap.com joseph.gomez@sap.com @lakshmihanspal
  • 25. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. In particular, SAP SE or its affiliated companies have no obligation to pursue any course of business outlined in this document or any related presentation, or to develop or release any functionality mentioned therein. This document, or any related presentation, and SAP SE’s or its affiliated companies’ strategy and possible future developments, products, and/or platform directions and functionality are all subject to change and may be changed by SAP SE or its affiliated companies at any time for any reason without notice. The information in this document is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. All forward-looking statements are subject to various risks and uncertainties that could cause actual results to differ materially from expectations. Readers are cautioned not to place undue reliance on these forward-looking statements, and they should not be relied upon in making purchasing decisions. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. See http://global.sap.com/corporate-en/legal/copyright/index.epx for additional trademark information and notices. © 2017 SAP SE or an SAP affiliate company. All rights reserved.