We all know how it goes – once a year, the auditor carries out an IT audit as part of the year-end audit. The idea is to flag potential threats in SAP cyber security, and in identity & access management.
In terms of risk, this procedure is no solution; rather, the step is taken much too late in the process to allow for any kind of quick reaction. Hackers may have already had ample time to take advantage of the risks. Despite this fact, many companies leave it too late to close loopholes.
In this webinar, we will show you a much better approach that addresses this discrepancy. Thanks to SAST SUITE, you can achieve continuous, highly efficient real-time monitoring of all critical and security-related changes to your SAP systems. This means you can act immediately. No more waiting until next year when the auditor is at your doorstep.
Topics of focus:
• Immediate detection of unauthorized authorization assignments
• Monitoring role allocation and any evasion of the dual control principle
• Proper reaction – without delay – to suspicious table change documents
• Cost-benefit analysis: manual downstream controls vs. intelligent real-time monitoring
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Although managed services are becoming a firm fixture in more and more IT areas, companies are still hesitant when it comes to SAP – even though almost all of them face similar challenges, including the specialized domain of SAP security and authorizations.
There is a shortage of specialist staff capable of ensuring GDPR-compliant monitoring of SAP systems, especially the sensitive personnel data they manage. Although they would like to monitor highly critical transactions, they often lack both the internal expertise and the suitable tools. Last but not least, although some companies monitor their IT systems in real time, the response times to alerts in the SAP environment are far too long to support a rapid response to identified threats.
Checking for vulnerabilities, flawed configurations, and critical authorizations on a regular basis is the only way to ensure SAP system security, however. With the SAST Managed Service, we can take care of all this for you, no matter whether your company is already playing in the Champions League of security or are only just starting out. We offer custom-tailored security and compliance solutions for both SAP ERP and SAP S/4HANA.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Conflicts between employers and works councils often arise in particular due to divergent views regarding the implementation and use of technical facilities, including the ability to monitor IT workplaces.
The benefits of constructive cooperation between works council, IT department, and HR are apparent. In this light, we have designed a webinar that demonstrates how you can use the SAST SUITE for the fair monitoring of the IT workplaces at your company – while at the same time complying with the German Works Constitution Act.
In addition to portraying the relevant intersections, we will show you the options you have for planning and managing SAP users directly in the system, as well as indicate the limits defined by the relevant laws. We will also present a tried and tested procedure model with a focus on an optimized authorization concept in SAP systems, enabling you to avoid conflicts from the start.
Topics of focus:
• Legal basis of the German Works Constitution Act in combination with the SAST SUITE
• Transaction statistics in the standard SAP system
• Privacy and data protection despite data loss prevention
• Procedure model for proactive conflict avoidance
• Model works agreement
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Year in and year out, the annual external audit is a given, as every SAP system and security administrator knows. Nonetheless, the current risk situation of the SAP systems is often uncertain. Have all the findings from the last audit really been rectified? Have new risks arisen in the meantime?
SAP authorization concepts are subject to continual change, which is why auditors check every year to make sure that authorizations like SAP_ALL and the SAP standard users are protected. The list of necessary measures is long: from installing security patches to checking and reducing critical authorizations. But the solution is simple: Don’t wait until the next audit! Instead, identify your vulnerabilities today. It’s the only way to guarantee the security of your SAP systems year-round and enable you to react to anomalies quickly.
In this webinar, we’ll show you how the SAST SUITE can help you define your top findings quickly, check critical authorizations efficiently, and keep your systems clean. You’ll never have to dread an auditor visit again.
Topics of focus:
- The next test is never far away – tips for effective follow-ups and optimal preparation for an audit
- Tool-supported identification and rectification of your top findings
- Stay clean through cyclical checks
- Best practice recommendations
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
When transforming authorization roles from your ERP system, there are many points to consider in parallel: For which transactions are there comparable counterparts, which must be exchanged, and which are even obsolete? To do this, you need to select the appropriate Fiori Apps for the new roles and, of course, you also need to adhere to your SAP authorization concept. This requires some preparatory work and analyses, especially if you plan to implement this work manually.
In this webinar we will show you how we can support you, shorten the migration period and at the same time greatly improve the quality and security of your roles. After all, it will be more expensive to clean up legacy issues only after migration - not to mention the damage caused by security holes that have been transferred.
Topics of focus:
• Challenges and necessary questions before project start
• Our project procedure at a glance
• Tips for identifying and eliminating risks in your SAP roles
• Advantages of the SAST Role Conversion Service
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Thousands of security-relevant settings in a common SAP system do not make it easy to implement a comprehensive security check. Although the DSAG test guide and other standards explain what should be checked, they do not show how this can be done, and certainly not what the ideal approach is. Therefore, in this webinar we will show you how you can effectively and efficiently control the security status of your SAP ERP and S/4HANA systems and what advantages a tool-based check offers you.
Topics of focus:
• Challenges with the implementation of security guidelines
• Overview of relevant regulations
• Project methodology for a security management process
• Advantages of tool-supported checks with the SAST SUITE
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
In order to maintain compliance in SAP systems, a well-established authorization management and a well-founded analysis of the separation of functions is necessary. This becomes all the more complex the more non-system solutions are available in your SAP ERP or S/4HANA landscape, because such systems usually have their own authorization structures.
It is therefore necessary to think about a reliable, cross-system authorization management in good time so that roles and authorizations are synchronized across all your SAP and non-SAP applications.
In this webinar, we will show you how to master comprehensive SoD analyses, business process analyses and the identification of authorization conflicts in the future – tool-supported and with a feasible administrative effort.
Topics of Focus:
• SoD analysis for SAP and non-SAP systems
• Cross-system authorization management with a central identity
• Evaluation of assigned roles and rights
• Advantages of the SAST User Access Management
• Best practice tips
-----------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Administrating a large number of user accounts often presents companies with serious challenges. Especially when you consider how complicated most of the available standard tools are. The effort is hardly manageable if user identities also need to be maintained in several systems, directory services, or databases.
The lack of an option to manage user IDs and authorizations across multiple systems in a transparent way, not only leads to insufficient clarity and SoD conflicts; it also requires more effort to address those issues.
We will demonstrate how you can manage the identities, roles and authorizations of your SAP users efficiently and also on a shared S/4HANA system landscape.
Topics of focus:
• Challenges of Identity Management in SAP S/4HANA systems
• Reduction of effort due to automated authorization requests
• Real time risk assessment of critical authorizations
• Advantages of the SAST User Access Management
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Only the permanent monitoring of all events allows you a reliable protection of your SAP systems. Thereby a real security incident can arise from a combination of several uncritical events.
In this webinar, Linde will provide insights on how to identify, evaluate and document such an incident as quickly as possible so that appropriate countermeasures can be taken. In case of an attack, the reaction capability has a considerable influence on the expected level of damage.
Topics of focus:
• What is needed for a reliable security monitoring
• Protection of your SAP systems on platform and authorization level
• Identification of vulnerabilities in real time
• Importance of security dashboards to analyze suspicious user activities
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Although managed services are becoming a firm fixture in more and more IT areas, companies are still hesitant when it comes to SAP – even though almost all of them face similar challenges, including the specialized domain of SAP security and authorizations.
There is a shortage of specialist staff capable of ensuring GDPR-compliant monitoring of SAP systems, especially the sensitive personnel data they manage. Although they would like to monitor highly critical transactions, they often lack both the internal expertise and the suitable tools. Last but not least, although some companies monitor their IT systems in real time, the response times to alerts in the SAP environment are far too long to support a rapid response to identified threats.
Checking for vulnerabilities, flawed configurations, and critical authorizations on a regular basis is the only way to ensure SAP system security, however. With the SAST Managed Service, we can take care of all this for you, no matter whether your company is already playing in the Champions League of security or are only just starting out. We offer custom-tailored security and compliance solutions for both SAP ERP and SAP S/4HANA.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Conflicts between employers and works councils often arise in particular due to divergent views regarding the implementation and use of technical facilities, including the ability to monitor IT workplaces.
The benefits of constructive cooperation between works council, IT department, and HR are apparent. In this light, we have designed a webinar that demonstrates how you can use the SAST SUITE for the fair monitoring of the IT workplaces at your company – while at the same time complying with the German Works Constitution Act.
In addition to portraying the relevant intersections, we will show you the options you have for planning and managing SAP users directly in the system, as well as indicate the limits defined by the relevant laws. We will also present a tried and tested procedure model with a focus on an optimized authorization concept in SAP systems, enabling you to avoid conflicts from the start.
Topics of focus:
• Legal basis of the German Works Constitution Act in combination with the SAST SUITE
• Transaction statistics in the standard SAP system
• Privacy and data protection despite data loss prevention
• Procedure model for proactive conflict avoidance
• Model works agreement
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Year in and year out, the annual external audit is a given, as every SAP system and security administrator knows. Nonetheless, the current risk situation of the SAP systems is often uncertain. Have all the findings from the last audit really been rectified? Have new risks arisen in the meantime?
SAP authorization concepts are subject to continual change, which is why auditors check every year to make sure that authorizations like SAP_ALL and the SAP standard users are protected. The list of necessary measures is long: from installing security patches to checking and reducing critical authorizations. But the solution is simple: Don’t wait until the next audit! Instead, identify your vulnerabilities today. It’s the only way to guarantee the security of your SAP systems year-round and enable you to react to anomalies quickly.
In this webinar, we’ll show you how the SAST SUITE can help you define your top findings quickly, check critical authorizations efficiently, and keep your systems clean. You’ll never have to dread an auditor visit again.
Topics of focus:
- The next test is never far away – tips for effective follow-ups and optimal preparation for an audit
- Tool-supported identification and rectification of your top findings
- Stay clean through cyclical checks
- Best practice recommendations
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
When transforming authorization roles from your ERP system, there are many points to consider in parallel: For which transactions are there comparable counterparts, which must be exchanged, and which are even obsolete? To do this, you need to select the appropriate Fiori Apps for the new roles and, of course, you also need to adhere to your SAP authorization concept. This requires some preparatory work and analyses, especially if you plan to implement this work manually.
In this webinar we will show you how we can support you, shorten the migration period and at the same time greatly improve the quality and security of your roles. After all, it will be more expensive to clean up legacy issues only after migration - not to mention the damage caused by security holes that have been transferred.
Topics of focus:
• Challenges and necessary questions before project start
• Our project procedure at a glance
• Tips for identifying and eliminating risks in your SAP roles
• Advantages of the SAST Role Conversion Service
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Thousands of security-relevant settings in a common SAP system do not make it easy to implement a comprehensive security check. Although the DSAG test guide and other standards explain what should be checked, they do not show how this can be done, and certainly not what the ideal approach is. Therefore, in this webinar we will show you how you can effectively and efficiently control the security status of your SAP ERP and S/4HANA systems and what advantages a tool-based check offers you.
Topics of focus:
• Challenges with the implementation of security guidelines
• Overview of relevant regulations
• Project methodology for a security management process
• Advantages of tool-supported checks with the SAST SUITE
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
In order to maintain compliance in SAP systems, a well-established authorization management and a well-founded analysis of the separation of functions is necessary. This becomes all the more complex the more non-system solutions are available in your SAP ERP or S/4HANA landscape, because such systems usually have their own authorization structures.
It is therefore necessary to think about a reliable, cross-system authorization management in good time so that roles and authorizations are synchronized across all your SAP and non-SAP applications.
In this webinar, we will show you how to master comprehensive SoD analyses, business process analyses and the identification of authorization conflicts in the future – tool-supported and with a feasible administrative effort.
Topics of Focus:
• SoD analysis for SAP and non-SAP systems
• Cross-system authorization management with a central identity
• Evaluation of assigned roles and rights
• Advantages of the SAST User Access Management
• Best practice tips
-----------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Administrating a large number of user accounts often presents companies with serious challenges. Especially when you consider how complicated most of the available standard tools are. The effort is hardly manageable if user identities also need to be maintained in several systems, directory services, or databases.
The lack of an option to manage user IDs and authorizations across multiple systems in a transparent way, not only leads to insufficient clarity and SoD conflicts; it also requires more effort to address those issues.
We will demonstrate how you can manage the identities, roles and authorizations of your SAP users efficiently and also on a shared S/4HANA system landscape.
Topics of focus:
• Challenges of Identity Management in SAP S/4HANA systems
• Reduction of effort due to automated authorization requests
• Real time risk assessment of critical authorizations
• Advantages of the SAST User Access Management
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Only the permanent monitoring of all events allows you a reliable protection of your SAP systems. Thereby a real security incident can arise from a combination of several uncritical events.
In this webinar, Linde will provide insights on how to identify, evaluate and document such an incident as quickly as possible so that appropriate countermeasures can be taken. In case of an attack, the reaction capability has a considerable influence on the expected level of damage.
Topics of focus:
• What is needed for a reliable security monitoring
• Protection of your SAP systems on platform and authorization level
• Identification of vulnerabilities in real time
• Importance of security dashboards to analyze suspicious user activities
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Our audits are designed to help you determine your SAP landscape's actual risk exposure and pinpoint areas that are open to potential attacks. They include everything from your infrastructure and SAP system parameters to individual component configurations and authorizations.
Also if your company's migration to SAP HANA or S/4HANA is right around the corner. An audit offers an ideal solution for safeguarding your systems and taking all the necessary security measures before you start your transition.
Our approach is based on SAP's security guidelines, the recommendations of the German Federal Office for Information Security (BSI), and the information security standard DIN ISO 27001.
Topics of focus:
• Challenges, tools and proven methods
• Advantages of a root cause analysis and of the resulting risks for your company
• Quick check vs. audit vs. penetrationtest
• Our project approach at a glance
• Recommendations for the follow-up of an Audit
-----------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Comprehensive authorization management and the SoD analysis that comes with it are essential measures in safeguarding SAP systems, especially in the context of compliance. However, problems can arise when connecting external solutions to an SAP landscape. SAP Ariba, for example, comes with its own role and authorization concept - one that often doesn't match the SAP standard. This makes truly comprehensive SoD analysis simply impossible.
The solution? Cross-system authorization management that monitors roles and authorizations while factoring in all the relationships among them. The authorization management module of SAST SUITE makes it possible to customize SoD functions in a way that incorporates roles and permissions into SoD analysis, even when non-SAP systems like Ariba are involved.
In this webinar, you'll learn how to take control of extensive SoD and business process analyses while identifying authorization conflicts across multiple systems.
-------------------------------------------------------------------------------------Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
How hackers are compromising S/4HANA and how you can protect yourself with SAST SUITE.
-------------------------------------------------------------------------------------
Significant changes are taking place in the world of SAP. By 2025, the majority of the company's customers will make the move to S/4HANA. The related preparations are fully under way – including among hackers who are looking to exploit every available security flaw.
Here, hackers have a key advantage: S/4HANA involves technology that’s not only extremely complex, but relatively new, as well. The risk of making configuration errors that could undermine security is definitely real.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The maxim “Trust is good, but control is better” definitely applies to SAP systems, which constitute the core of many companies’ IT landscapes. The current security status of such systems should be known to more than just the SAP experts involved; indeed, this information is becoming relevant to more and more contacts at companies. As a result, it's all the more important that analyses be intuitive and user-friendly.
SAST Management Dashboard enables you to assess the security of your SAP systems at a glance. It analyzes key risks and presents the results in a visual format while also depicting trends over time.
At the press of a button, SAST Management Dashboard can provide you with a current status report based on risk KPIs you define in advance and reveal the causes of security flaws. The benefits are clear: You’ll have constant access to high-quality information regarding your present risk situation and you security will taken to the next level.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
It has long been no secret that cyber criminals particularly like to attack SAP systems. After all, they are perfectly suited as a backdoor for a company's highly sensitive data, and there is no better way to make money.
You can't prevent attacks, but with the right cyber threat detection strategy, you can be prepared, detect anomalies immediately and respond to security incidents immediately.
We'll show you how to properly assess threats, identify and neutralize real cyber-attacks before they can cause serious damage.
Topics of Focus:
• Building an SAP cyber security strategy you can trust
• Protection of your SAP systems on platform and authorization level
• Identification of weak points in real time
• Importance of security dashboards to analyze suspicious user activity
• Advantages of the SAST SUITE for your SAP Threat Detection measures
• Best practice tips for typical attack scenarios
-----------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Fiori and S/4 authorizations: "What are the biggest challenges, and where do the risks lie?"
-------------------------------------------------------------------------------------Many SAP customers are currently planning to implement SAP S/4HANA or are already making the transition. Besides the extensive new architectural aspects involved, implementing S/4HANA and Fiori also changes quite a few longstanding rules in the area of SAP authorizations.
A number of transactions - some of which veteran SAP ERP users have come to hold dear - have either been integrated into other transactions, replaced by Fiori apps, or simply eliminated. Meanwhile, the consistent use of OData services in the context of Fiori has resulted in a variety of ramifications with regard to security design in both the front and back end.
------------------------------------------------------------------------------------- Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
As anyone who works in the field of SAP Basis services will tell you, there's always something to optimize when it comes to user authorizations. What these efforts fail to do far too often, however, is remove transactions that are no longer in use from the respective roles. This leads to preventable risks with regard to the segregation of duties and unnecessary resource consumption in administration.
After conducting various tests on intelligent ways to streamline role profiles, RENK AG settled on one solution: the new Self-Adjusting Authorizations module of SAST SUITE. During authorization projects, it's not uncommon for our experts to find users with up to 500 SAP authorizations - only 25% of which they actually utilize.
With SAST Self-Adjusting Authorizations, you can implement tailored, fully streamlined roles without putting any restrictions on your day-to-day business - which is also the best way to prepare for your next SAP license audit.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
User Access Management: "Using SAST Safe Go-Live Management to prevent disruptions in authorization design."
-------------------------------------------------------------------------------------
Whether it's after an audit or during an S/4HANA project, companies' requirements regarding quality, the time involved, and of course, their project budget often differ greatly when it comes to planning authorization redesigns.
No matter what your own priorities are in authorization projects, AKQUINET offers solutions designed to meet every requirement to the letter. And the best part? Thanks to SAST Safe Go-Live Management methodology, your project won't cause any disruptions in your everyday business.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Security Intelligence: “What you stand to gain from intelligent, SAP real-time monitoring."
-------------------------------------------------------------------------------------
Your efforts to protect your SAP systems won't be complete until you have reliable way to keep a constant eye on your transactions and applications. When you detect critical incidents right when they occur, you'll be able take immediate action in response. When you're under attack, your reaction time has a significant impact on the level of damage you can expect. It's not hard to see how a real-time solution like AKQUINET's SAST Security Radar pays for itself in short order.
Detecting attacks based on log files and analyzing network traffic requires in-depth knowledge of the potential paths and patterns such incursions can follow. This is because events relevant to security have to be filtered out of a sea of data and placed in the proper context.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
IT audits are a universally accepted quality measure and have become indispensable. As such, internal audits are increasingly being used in addition to annual reviews by external auditors, to check the configuration of SAP landscapes and user authorizations. Their benefits: They can analyze individual aspects in shorter intervals, help prepare for and follow up on annual audits, and provide optimal support to internal control systems.
It must be noted, however, that any audit merely provides a snapshot of the current situation. But what about analyses of transactions, changes, and system behavior? When and where have employees deviated from the specified working methods? Were differing settings intentionally changed back to the “target” state?
Take the initiative and round out your spot checks with automated real-time monitoring. Stop limiting your SAP security analyses to a single point in time and instead identify risks holistically, over freely definable periods. In our webinar, we’ll show you the new possibilities and describe how the SAST SUITE can help you optimize your internal control systems, while at the same time establishing reliable real-time monitoring of your SAP systems.
Topics of focus:
• The most frequently underestimated activities
• How to optimize cyclical analyses of the system configuration and user settings
• Why real-time analyses are so important for your IT security concept
• Benefits of tool-based checks using SAST SUITE
• Best practice recommendations
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
sPlatform Security: "Are you really that attached to your ABAP security flaws, or can they go?"
-------------------------------------------------------------------------------------
Attacks on companies have increased exponentially in recent years. Not uncommonly, these were made possible by software vulnerabilities. SAP systems are particularly critical for many core business processes and should receive corresponding protections.
However, you'll only achieve a basic level of security that can weather stress tests and remain consistent if you take a truly head-to-toe approach to security. And that includes your ABAP code. In our experience to date, many companies balk at audits of their custom developments or 3rd-party add-ons, or are unsatisfied with the nearly unmanageable number of findings. How can this mass of supposedly critical security flaws be evaluated reliably? Where do you even start to clean up?
The newest module in our SAST SUITE, the Code Security Advisor, offers a solution. It is directly integrated into your SAP system and has a risk assessment enriched by key figures such as usage statistics for prioritization, an option to easily decommission obsolete code and a comprehensive set of rules with test cases developed by our SAP security and compliance consultants based on their years of experience.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Managed Services: "The choice is yours: a make or buy approach to SAP security and compliance?"
-------------------------------------------------------------------------------------
Checking for vulnerabilities, flawed configurations, and critical authorizations on a regular basis is the only way to ensure SAP system security. However, efforts like these are technically complex, which is why they require so much time and personnel. Decision-makers thus face a fundamental question: Should they "make" or “buy" their way to SAP security and compliance? Our SAST MANAGED SERVICES offer a holistic solution that can assist you in both on-site and remote environments.
--------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The interest in SAP security has been growing exponentially, and not only among whitehats. SAP invests money and resources in security, provides guidelines, and arranges conferences, but, unfortunately, SAP users still pay little attention to SAP security
There are most important takeaways for CISOs to provide SAP Security for Enterprises. The presentation destroys the SAP Security myths, includes statistics obtained by ERPScan Research Group, and future trends in SAP Security.
The presentation describes 5 steps you should take to secure your SAP. There are:
1. Pentesting and Audit
2. Compliance
3. Internal security and SOD
4. ABAP Source code review
5. Forensics
In practice, we often see SAP security projects that only offer a partial solution. Only rarely do such projects involve an end-to-end examination of all layers – from operating system to databases and applications, as well as concepts and policies.
At the same time, an all-encompassing approach to security is essential for projects involving the implementation of or migration to SAP S/4HANA, because the database, user interface, gateway, applications, and authorizations have all grown closer together. As a result, access to important data has become both more complex and more difficult to monitor – especially due to media discontinuity and access options at different layers. This means your framework authorization concept has to combine all these topics prior to implementation and define an end-to-end security strategy.
Ideally, all the security expertise needed for a comprehensive solution like this will come from a single source. This will guarantee perfect interplay between design and management, as well as monitoring, administration, and auditing. And you will also cover all the security areas, in the sense of a comprehensive SIEM system.
In this webinar, we will show you why SAST SOLUTIONS, with our highly specialized SAP experts in combination with our SAST SUITE solution, have just what you are looking for.
Topics of focus:
• The challenges of successful SAP S/4HANA security projects
• How to make sure your SAP S/4HANA implementation or migration is a success
• Benefits of support by SAST SUITE tools
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
SAP License Audit Tips
www.auditbots.com
SAP Audit Procedure for SAP License
Real-time analysis and SAP Audit procedure for SAP license type classification helps companies both reduce the time and cost of SAP license audits, as well as the overall cost of licensing SAP.
By providing live snapshots, methods for classifications and consolidating a user’s various usernames into a single entity, the user license manager can show companies what they can save in licensing costs. SAP License Manager can be automated too.
According to Gartner Senior Analyst, Patricia Adams “ Depending upon the level of maturity, enterprises that implement software usage capabilities will achieve savings of 5% to 25% in the first year”.
The interest in SAP security is growing exponentially, and not only among whitehats. Unfortunately, SAP users still pay little attention to SAP security.
Obtained findings were presented at RSA APAC Conference 2013.
This research focuses on statistics of SAP Vulnerabilities, threats from the Internet, known incidents and future trends.
Your efforts to protect your SAP systems won't be complete until you have reliable way to keep a constant eye on your transactions and applications. When you detect critical incidents right when they occur, you'll be able take immediate action in response. When you're under attack, your reaction time has a significant impact on the level of damage you can expect. It's not hard to see how a real-time solution like AKQUINET's SAST Security Radar pays for itself in short order.
Detecting attacks based on log files and analyzing network traffic requires in-depth knowledge of the potential paths and patterns such incursions can follow. This is because events relevant to security have to be filtered out of a sea of data and placed in the proper context.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The AMSYS Life Cycle Management (LCM) Client software individually maps customer’s processes in its Obsolescence Management (OM) Module to automate obsolescence case management. The Risk Management (RM) Module allows customizable risk analysis compliant to SD-22 DMSMS and IEC62402 standard, aggregating Database API and customer’s internal data.
Obsolescence Management (OM) Module
Each party involved knows exactly what and when something needs to be done, so that optimal results are achieved with consistent efficiency. With clear structures and comments, each step in the obsolescence solution finding process is tracked for full traceability and reduced lead times.
Full transparency and greater team satisfaction is guaranteed through automated workflows.
Risk Management (RM) Module
All users have an up-to-date overview of the condition of their systems. Lifecycle forecasts and likelihoods at component level are automatically combined with individual impact factors on your products. In addition, suitable resolutions are proposed to overcome obsolescence issues and mitigate risk.
Prevent unnecessary losses with early detection as well as proactive assessment and treatment of risk.
Our audits are designed to help you determine your SAP landscape's actual risk exposure and pinpoint areas that are open to potential attacks. They include everything from your infrastructure and SAP system parameters to individual component configurations and authorizations.
Also if your company's migration to SAP HANA or S/4HANA is right around the corner. An audit offers an ideal solution for safeguarding your systems and taking all the necessary security measures before you start your transition.
Our approach is based on SAP's security guidelines, the recommendations of the German Federal Office for Information Security (BSI), and the information security standard DIN ISO 27001.
Topics of focus:
• Challenges, tools and proven methods
• Advantages of a root cause analysis and of the resulting risks for your company
• Quick check vs. audit vs. penetrationtest
• Our project approach at a glance
• Recommendations for the follow-up of an Audit
-----------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Comprehensive authorization management and the SoD analysis that comes with it are essential measures in safeguarding SAP systems, especially in the context of compliance. However, problems can arise when connecting external solutions to an SAP landscape. SAP Ariba, for example, comes with its own role and authorization concept - one that often doesn't match the SAP standard. This makes truly comprehensive SoD analysis simply impossible.
The solution? Cross-system authorization management that monitors roles and authorizations while factoring in all the relationships among them. The authorization management module of SAST SUITE makes it possible to customize SoD functions in a way that incorporates roles and permissions into SoD analysis, even when non-SAP systems like Ariba are involved.
In this webinar, you'll learn how to take control of extensive SoD and business process analyses while identifying authorization conflicts across multiple systems.
-------------------------------------------------------------------------------------Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
How hackers are compromising S/4HANA and how you can protect yourself with SAST SUITE.
-------------------------------------------------------------------------------------
Significant changes are taking place in the world of SAP. By 2025, the majority of the company's customers will make the move to S/4HANA. The related preparations are fully under way – including among hackers who are looking to exploit every available security flaw.
Here, hackers have a key advantage: S/4HANA involves technology that’s not only extremely complex, but relatively new, as well. The risk of making configuration errors that could undermine security is definitely real.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The maxim “Trust is good, but control is better” definitely applies to SAP systems, which constitute the core of many companies’ IT landscapes. The current security status of such systems should be known to more than just the SAP experts involved; indeed, this information is becoming relevant to more and more contacts at companies. As a result, it's all the more important that analyses be intuitive and user-friendly.
SAST Management Dashboard enables you to assess the security of your SAP systems at a glance. It analyzes key risks and presents the results in a visual format while also depicting trends over time.
At the press of a button, SAST Management Dashboard can provide you with a current status report based on risk KPIs you define in advance and reveal the causes of security flaws. The benefits are clear: You’ll have constant access to high-quality information regarding your present risk situation and you security will taken to the next level.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
It has long been no secret that cyber criminals particularly like to attack SAP systems. After all, they are perfectly suited as a backdoor for a company's highly sensitive data, and there is no better way to make money.
You can't prevent attacks, but with the right cyber threat detection strategy, you can be prepared, detect anomalies immediately and respond to security incidents immediately.
We'll show you how to properly assess threats, identify and neutralize real cyber-attacks before they can cause serious damage.
Topics of Focus:
• Building an SAP cyber security strategy you can trust
• Protection of your SAP systems on platform and authorization level
• Identification of weak points in real time
• Importance of security dashboards to analyze suspicious user activity
• Advantages of the SAST SUITE for your SAP Threat Detection measures
• Best practice tips for typical attack scenarios
-----------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Fiori and S/4 authorizations: "What are the biggest challenges, and where do the risks lie?"
-------------------------------------------------------------------------------------Many SAP customers are currently planning to implement SAP S/4HANA or are already making the transition. Besides the extensive new architectural aspects involved, implementing S/4HANA and Fiori also changes quite a few longstanding rules in the area of SAP authorizations.
A number of transactions - some of which veteran SAP ERP users have come to hold dear - have either been integrated into other transactions, replaced by Fiori apps, or simply eliminated. Meanwhile, the consistent use of OData services in the context of Fiori has resulted in a variety of ramifications with regard to security design in both the front and back end.
------------------------------------------------------------------------------------- Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
As anyone who works in the field of SAP Basis services will tell you, there's always something to optimize when it comes to user authorizations. What these efforts fail to do far too often, however, is remove transactions that are no longer in use from the respective roles. This leads to preventable risks with regard to the segregation of duties and unnecessary resource consumption in administration.
After conducting various tests on intelligent ways to streamline role profiles, RENK AG settled on one solution: the new Self-Adjusting Authorizations module of SAST SUITE. During authorization projects, it's not uncommon for our experts to find users with up to 500 SAP authorizations - only 25% of which they actually utilize.
With SAST Self-Adjusting Authorizations, you can implement tailored, fully streamlined roles without putting any restrictions on your day-to-day business - which is also the best way to prepare for your next SAP license audit.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
User Access Management: "Using SAST Safe Go-Live Management to prevent disruptions in authorization design."
-------------------------------------------------------------------------------------
Whether it's after an audit or during an S/4HANA project, companies' requirements regarding quality, the time involved, and of course, their project budget often differ greatly when it comes to planning authorization redesigns.
No matter what your own priorities are in authorization projects, AKQUINET offers solutions designed to meet every requirement to the letter. And the best part? Thanks to SAST Safe Go-Live Management methodology, your project won't cause any disruptions in your everyday business.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Security Intelligence: “What you stand to gain from intelligent, SAP real-time monitoring."
-------------------------------------------------------------------------------------
Your efforts to protect your SAP systems won't be complete until you have reliable way to keep a constant eye on your transactions and applications. When you detect critical incidents right when they occur, you'll be able take immediate action in response. When you're under attack, your reaction time has a significant impact on the level of damage you can expect. It's not hard to see how a real-time solution like AKQUINET's SAST Security Radar pays for itself in short order.
Detecting attacks based on log files and analyzing network traffic requires in-depth knowledge of the potential paths and patterns such incursions can follow. This is because events relevant to security have to be filtered out of a sea of data and placed in the proper context.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
IT audits are a universally accepted quality measure and have become indispensable. As such, internal audits are increasingly being used in addition to annual reviews by external auditors, to check the configuration of SAP landscapes and user authorizations. Their benefits: They can analyze individual aspects in shorter intervals, help prepare for and follow up on annual audits, and provide optimal support to internal control systems.
It must be noted, however, that any audit merely provides a snapshot of the current situation. But what about analyses of transactions, changes, and system behavior? When and where have employees deviated from the specified working methods? Were differing settings intentionally changed back to the “target” state?
Take the initiative and round out your spot checks with automated real-time monitoring. Stop limiting your SAP security analyses to a single point in time and instead identify risks holistically, over freely definable periods. In our webinar, we’ll show you the new possibilities and describe how the SAST SUITE can help you optimize your internal control systems, while at the same time establishing reliable real-time monitoring of your SAP systems.
Topics of focus:
• The most frequently underestimated activities
• How to optimize cyclical analyses of the system configuration and user settings
• Why real-time analyses are so important for your IT security concept
• Benefits of tool-based checks using SAST SUITE
• Best practice recommendations
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
sPlatform Security: "Are you really that attached to your ABAP security flaws, or can they go?"
-------------------------------------------------------------------------------------
Attacks on companies have increased exponentially in recent years. Not uncommonly, these were made possible by software vulnerabilities. SAP systems are particularly critical for many core business processes and should receive corresponding protections.
However, you'll only achieve a basic level of security that can weather stress tests and remain consistent if you take a truly head-to-toe approach to security. And that includes your ABAP code. In our experience to date, many companies balk at audits of their custom developments or 3rd-party add-ons, or are unsatisfied with the nearly unmanageable number of findings. How can this mass of supposedly critical security flaws be evaluated reliably? Where do you even start to clean up?
The newest module in our SAST SUITE, the Code Security Advisor, offers a solution. It is directly integrated into your SAP system and has a risk assessment enriched by key figures such as usage statistics for prioritization, an option to easily decommission obsolete code and a comprehensive set of rules with test cases developed by our SAP security and compliance consultants based on their years of experience.
-------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
Managed Services: "The choice is yours: a make or buy approach to SAP security and compliance?"
-------------------------------------------------------------------------------------
Checking for vulnerabilities, flawed configurations, and critical authorizations on a regular basis is the only way to ensure SAP system security. However, efforts like these are technically complex, which is why they require so much time and personnel. Decision-makers thus face a fundamental question: Should they "make" or “buy" their way to SAP security and compliance? Our SAST MANAGED SERVICES offer a holistic solution that can assist you in both on-site and remote environments.
--------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The interest in SAP security has been growing exponentially, and not only among whitehats. SAP invests money and resources in security, provides guidelines, and arranges conferences, but, unfortunately, SAP users still pay little attention to SAP security
There are most important takeaways for CISOs to provide SAP Security for Enterprises. The presentation destroys the SAP Security myths, includes statistics obtained by ERPScan Research Group, and future trends in SAP Security.
The presentation describes 5 steps you should take to secure your SAP. There are:
1. Pentesting and Audit
2. Compliance
3. Internal security and SOD
4. ABAP Source code review
5. Forensics
In practice, we often see SAP security projects that only offer a partial solution. Only rarely do such projects involve an end-to-end examination of all layers – from operating system to databases and applications, as well as concepts and policies.
At the same time, an all-encompassing approach to security is essential for projects involving the implementation of or migration to SAP S/4HANA, because the database, user interface, gateway, applications, and authorizations have all grown closer together. As a result, access to important data has become both more complex and more difficult to monitor – especially due to media discontinuity and access options at different layers. This means your framework authorization concept has to combine all these topics prior to implementation and define an end-to-end security strategy.
Ideally, all the security expertise needed for a comprehensive solution like this will come from a single source. This will guarantee perfect interplay between design and management, as well as monitoring, administration, and auditing. And you will also cover all the security areas, in the sense of a comprehensive SIEM system.
In this webinar, we will show you why SAST SOLUTIONS, with our highly specialized SAP experts in combination with our SAST SUITE solution, have just what you are looking for.
Topics of focus:
• The challenges of successful SAP S/4HANA security projects
• How to make sure your SAP S/4HANA implementation or migration is a success
• Benefits of support by SAST SUITE tools
• Best practice tips
-------------------------------------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
SAP License Audit Tips
www.auditbots.com
SAP Audit Procedure for SAP License
Real-time analysis and SAP Audit procedure for SAP license type classification helps companies both reduce the time and cost of SAP license audits, as well as the overall cost of licensing SAP.
By providing live snapshots, methods for classifications and consolidating a user’s various usernames into a single entity, the user license manager can show companies what they can save in licensing costs. SAP License Manager can be automated too.
According to Gartner Senior Analyst, Patricia Adams “ Depending upon the level of maturity, enterprises that implement software usage capabilities will achieve savings of 5% to 25% in the first year”.
The interest in SAP security is growing exponentially, and not only among whitehats. Unfortunately, SAP users still pay little attention to SAP security.
Obtained findings were presented at RSA APAC Conference 2013.
This research focuses on statistics of SAP Vulnerabilities, threats from the Internet, known incidents and future trends.
Your efforts to protect your SAP systems won't be complete until you have reliable way to keep a constant eye on your transactions and applications. When you detect critical incidents right when they occur, you'll be able take immediate action in response. When you're under attack, your reaction time has a significant impact on the level of damage you can expect. It's not hard to see how a real-time solution like AKQUINET's SAST Security Radar pays for itself in short order.
Detecting attacks based on log files and analyzing network traffic requires in-depth knowledge of the potential paths and patterns such incursions can follow. This is because events relevant to security have to be filtered out of a sea of data and placed in the proper context.
--------------------------------------------------------------------------------
Für Informationen auf Deutsch, sprechen Sie uns gerne an: sast@akquinet.de
The AMSYS Life Cycle Management (LCM) Client software individually maps customer’s processes in its Obsolescence Management (OM) Module to automate obsolescence case management. The Risk Management (RM) Module allows customizable risk analysis compliant to SD-22 DMSMS and IEC62402 standard, aggregating Database API and customer’s internal data.
Obsolescence Management (OM) Module
Each party involved knows exactly what and when something needs to be done, so that optimal results are achieved with consistent efficiency. With clear structures and comments, each step in the obsolescence solution finding process is tracked for full traceability and reduced lead times.
Full transparency and greater team satisfaction is guaranteed through automated workflows.
Risk Management (RM) Module
All users have an up-to-date overview of the condition of their systems. Lifecycle forecasts and likelihoods at component level are automatically combined with individual impact factors on your products. In addition, suitable resolutions are proposed to overcome obsolescence issues and mitigate risk.
Prevent unnecessary losses with early detection as well as proactive assessment and treatment of risk.
SAP GRC online Training on Access Control , which includes all the four components Access Risk Analysis( ARA), Emergency Access Management ( EAM), Access Request Management(ARM), Business Role Management( BRM).
GRC 12 online training
SAP GRC 10 Online Training
Business Process Automation A Productivity LeverKnoldus Inc.
"While technical team build / implement systems and solutions to automate business process, there is still ample work to be done by end users as part of the business process which mainly include data building, cleansing, consolidation, validation, reconciliation.
This exercise includes accessing diff systems, websites (internal/external), communication with diff agencies, building reports, comply with regulations.
Most of these tasks are performed following very standard steps with minimum or no exceptional scenario. Even exceptions occurs, resolution path is predefined.
Being routine tasks, either organization has to engaged high cost resources to perform these tasks or add more manpower to support the team. This adds to productivity issues.
Business Process Automation, using S/w Bot (also called RPA) is a tool which help to automate these processes by configuring all steps, business rules and exceptions with required security measures.
Thus RPA tool helps to business multiple ways (beyond cost saving) viz. Team Productivity, Consistency, Predictability and improved customer / user experience.
"
Datawarehouse and reporting in service manager Eduardo Castro
La plataforma de almacén de datos Service Manager proporciona una experiencia de informes enriquecida y proporciona bastantes informes listos para utilizarse. ¿Pero cómo los personaliza para su organización? ¿Cómo crea sus propios informes e incluye información desde OpsMgr y CfgMgr? En esta sesión con un paquete demo le demostraremos la arquitectura del Almacén de datos y a utilizar QL BI Studio para personalizar y crear informes para su medio ambiente de Service Manager.
Saludos,
Ing. Eduardo Castro Martínez, PhD – Microsoft SQL Server MVP
http://tiny.cc/comwindows
http://mswindowscr.org
http://comunidadwindows.org
Costa Rica
DynaFlow is a leading provider of Governance, Risk and Compliance (GRC) / Enterprise Risk Management (ERM) and Workflow Automation Solutions (WFM). DynaFlow enables global companies to become “Simply in Control” by proactively managing enterprise risks, demonstrating compliance and automating and optimizing business processes. Established in 1997, DynaFlow pioneered in the area of Business Process Modeling and Knowledge Management and is dedicated to provide its clients a fast ROI through a short and structured implementation.
CEP and SOA: An Open Event-Driven Architecture for Risk ManagementTim Bass
CEP and SOA: An Open Event-Driven Architecture for Risk Management, March 14, 2007, IIT Financial Services 2007, Lisbon, Portugal, Tim Bass, CISSP, Principal Global Architect, Director Emerging Technologies Group
SOC 2 Compliance Made Easy with Process Street amp DrataKashish Trivedi
SOC 2 has a reputation for being difficult and complex. You could argue that this is by design, since you need help from a small group of top-notch, pricey experts to be compliant. A kinder view is that it’s just how info security operates (there’s no one-size-fits-all fix). To set up the right protections, a company has to either create them according to the risks they face, or narrow down a huge list of possible controls, again, considering the risks. In a nutshell, SOC 2 goes with the first option: it sets broad criteria and lets each organization come up with controls to meet those criteria, based on their unique risks. Sounds reasonable, but it’s not exactly a walk in the park for those who aren’t experts. That’s where both workflow automation and compliance automation software can come in handy. In this post I’ll introduce you to Drata and Process Street, two essential tools that, when used together, provide a complete solution to help you speed up and simplify your yearly SOC 2 compliance.
Local or remote privileged accounts (technical users), e.g. ‘root’ or ‘administrator’, have wide-ranging authorisations and pose a considerable security risk. Passwords associated with these accounts provide access to all business-critical databases. However, switching privileged and shared accounts to individual users is not the solution, because this would mean having to set up hundreds or thousands of accounts. Managing these accounts would be extremely time-consuming and costly. The weak points of privileged and shared accounts are lack of traceability and associated infringement of statutory and regulatory requirements (compliance).
SAP Risk Management
www.auditbots.com
Organizations increasingly prefer their SAP operations to be assessed/audited during implementation as well as post-implementations to make sure all the business controls are in place and compliance with statutory/legal & other regulatory requirements such as Sarbanes-Oxley, etc. Auditbot offers SAP Risk Management (ERM) services to its customers to meet these needs.
AuditBOT has been successful in addressing the SAP Audit & Controls and Compliance issues. We have been involved in projects typically involving Basis Security Review, Program Change Control, SAP Basis Authorizations, Legacy System interface controls, IT Environment review, Functional Configuration & Business Process review, User-access and segregation of duties.
Similar to What if a hacker has already broken in when your IT auditor is at the door? How to actually protect your SAP systems. [Webinar] (20)
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
What if a hacker has already broken in when your IT auditor is at the door? How to actually protect your SAP systems. [Webinar]
1. When the auditor rings,
the hacker may have
already been there.
How to actually protect your
SAP systems.
2. WELCOME!
Introducing your host today:
TIM KRÄNZKE
CSO SAST SOLUTIONS
Tel: +49 40 88173-2735
Email: tim.kraenzke@akquinet.com
Web: sast-solutions.com
MICHAEL MÜLLNER
Head of Security & Compliance Services
Tel: +43 676 9398461
Email: michael.muellner@akquinet.at
Web: sast-solutions.com
- 2 -
3. The IT audit as a snapshot:
Reduce the risk of exploitation through traceability and risk detection.
Business User SoD conflicts
Users with extensive
authorizations
Insecure Configuration
Patching and Maintenance
SAP environment
Administrator
External check identifies errors
Fraud
Misappropriation
Vulnerabilities
Loss of control
Downstream and randomly...
too late / slow
Security for user management
Test functions and regulations
Secure SAP configuration
Risk monitoring
- 5 -
4. The IT audit as a snapshot:
- 6 -
Downstream and randomly...
too late / slow
7. SAST SUITE: Real-time monitoring of your SAP systems.
- 10 -
Common standard IT security solutions do not integrate your SAP systems.
Fastest possible response time in the event of a threat situation.
Identification of critical and unusual activities in real time.
Protecting the SAP system landscape against
Cyberattacks
Espionage
Manipulation
Abuse of rights
Data theft
Attacks on SAP systems often remain undetected.
!
✓ SAST SUITE monitors your SAP system landscape comprehensively and in real time!
The challenge
8. Why attacks on SAP systems are often not recognized.
- 11 -
Penetration Tests
Attack using known SAP
vulnerabilities:
Unprotected RFC Functions
Open Gateways
Old SAP routers
Result:
A local Windows Admin account
was created to perform the
"Capture the flag" action via RDP.
Customer Security Team
Was focused on network
protocols.
Monitors Active Directory users
and no local user accounts.
Result:
No suspicious event was detected
in the logs.
Regular SIEM-tools do not have
special SAP controls and are
therefore usually blind to
attacks on SAP systems.
None of our simulated attacks
has been detected by SIEM
specialists in recent years.
Summary
SAP is the "blind spot" for SIEM tools!
!
Result:
Due to missing attack patterns,
threats and attacks are not
identified.
9. Real-time threat detection for SAP systems.
Threat scenarios from which SAST SUITE protects you:
- 12 -
Manipulation of users and
authorization
Assignment of critical authorization
Misuse of critical reports and function
modules
Access to critical, blacklisted
transactions
Critical changes to system configuration
Manipulation of critical database tables
Information disclosure
File manipulation
(parameter configuration, transports)
Suspicious user behavior
(technical and dialog users)
DoS detection
Monitoring SAP security notes
Critical transport content
Extraction of confidential information
(GDPR)
Critical remote function calls
Login attempts of privileged account
Account sharing
Misuse debugging and error-analysis
Threat hunting
Forensic analysis
Correlation of different accounts to
one person (Central Identity)
10. All-around protection for your SAP system with real time monitoring.
SAP ERP
SAP BI
SAP CRM
SAP SCM
…
NetWeaver
Reports
and
analytics
SAST Security Dashboard
Splunk
Extraction
of all relevant
log data
Threat
intelligence
User and role management
Superuser logging
Download logging
SIEM
Integration
SoD analyses
System configuration
Vulnerability & compliance scan
- 13 -
SAST SUITE for SAP ERP and S/4HANA
11. Real time cyber security monitoring:
Find the needle in the haystack with SAST SUITE.
- 14 -
SOC
TEAM
12. Real-time monitoring of your SAP systems with SAST SUITE.
Your advantages at a glance:
Constant monitoring of configuration, authorizations and security and change logs.
- 15 -
Push-button access to the security status of entire SAP system landscape.
Seamless integration into existing SIEM solutions.
Aggregated and evaluated information about security policy breaches.
Automatic alerting for critical and complex events, even by combining several events that
appear uncritical when viewed individually.
Pseudonymization of user data to ensure compliance with the data protection laws of the
European Union (GDPR).
Ongoing content updates keeping all systems up-to-date.
+
+
+
+
+
+
+
14. AKQUINET business Robots (bRobots)
Our software suite at a glance:
bRobots for SAP ERP or S/4HANA
SAP AUTHORISATIONS SAP COMPLIANCE SAP INTELLIGENCE
aAAS – automatic Auth. Assignm. Solution
aRCS – automatic Role Creation Solution aTCM – automatic Table Change Monitor
- 17 -
aRMS – automatic Role Mapping Solution
aCW+ – automatic Compliance Workflow+
aBPM – automatic Business Partner Mgmt
aYECP – automatic Year End Closing
Procedure
aUCS – automatic User Creation Solution
aMDM – automatic Master Data Mgmt
15. AKQUINET business Robots (bRobots)
Operating principle:
- 18 -
No need for
programming
knowledge
Business
Topics
d*BIC
bRobots
Fiori App+
Decision+
Workflow+
Results
Knowledge
automation
Intelligent
workflow control
16. AKQUINET business Robots (bRobots)
Operating principle:
Decision+ App+
Business roles, the core of every bRobots
Represent the “drive”
Defines process-dependent decisions
Ensure efficient and intelligent process
flow
Input interfaces from the bRobots
Dynamically generated in real time
based on the rule base
No conventional programming
necessary
Generated context-based as Fiori
interface or SAP GUI user mask
Relies on SAP standard workflow
Offers the possibility to define
process chains
Collects and processes data across
multiple domains
Intelligent structure and sustainable
documentation of processes
Workflow+
- 19 -
17. How bRobots support
Initial situation
bRobots in the context of security intelligence:
Often implemented in companies:
Downstream controls
Expensive static release workflows
Increase compliance:
Multi-level approval workflows are implemented as
upstream (preventive) controls
Automation of critical processes
Documented activities in one workflow
Transparency and traceability
Users can see only the information that is relevant
and intended for them
- 20 -
Conclusion:
Violations are not discovered or with a time delay
Huge administrative expenses for controls
Cost-intensive due to manual activities
Control mechanisms often operate too late and do not
adequately compensate for risks
Repetitive, manually performed activities are error-prone and more cost-intensive.
!
✓ CW+ reduces the project duration and the implementation effort!
18. Use case 1:
Suspicious change of table - supplier
bRobot
Compliance
Officer
Cyclical
evaluation of
the change
documents
Critical
change?
Checking the
change
Starting
workflow
Change
okay?
Document check result
in workflow
yes
Department
Data change
(e.g. bank details of
the supplier)
yes
Manual data
correction
no
End
Start
no
- 21 -
19. Use case 2:
Recognition of conspicuous/critical price changes
Prices may change due to various users
bRobot focuses on users with relevant
SoD conflicts
(Possibility to change prices, invoice and manage
customer orders)
bRobot checks all price adjustments
automated and decision-based
Release workflow initiated in suspicious
cases only
Check
Approve / reject
Price reduction of x%
in relation to
Material type
Sales organization
Stock situation
etc.
Identification of user Workflow relevance
Identification of exceptional price adjustments
Workflow
Consideration of SoD conflicts
✓ ✓
- 22 -
20. Use case 3:
Recognition of conspicuous/critical scrapping processes
Focusing on all SAP users who could
basically scrap material in the system
(e.g. spare parts)
bRobot checks all crapping processes
desision-based
Release workflow initiated in
suspicious cases only
Compliance Workflow+ defines
essential decision criteria
Check
Approve / reject
Material scrapping
depending on:
Value of goods
Stock situation
Movement types
Material types
etc.
Identification of activities Workflow relevance
Identification of exceptional stock changes
Workflow
Consideration of critical activities
✓ ✓
- 23 -
22. Central deposit of criteria for criticalities through decision tables
Flexible selection from a wide range of criteria
Determine and assign actions depending on criticality
Step 1: Maintaining criteria for criticalities
- 25 -
Example: Differentiation by supplier number and authorization group
Lines 2 and 4 = trigger a workflow for further checking
Zeile 5 = triggers an e-mail notification to the responsible person
23. Critical changes generate dynamic workflows
and automatically add to the agent's worklist
Possibility to search for responsible person depending on
the identified criticality
Responsible person can review and evaluate the incident
(e.g., compliance officer)
Conventional SAP GUI interface or Fiori frontend
Step 2: Dynamic creation of workflows
- 26 -
24. The results of the triggered workflows are stored. Evaluation is possible at operational as well
as strategic level.
Operationally, the status of individual workflows can be viewed at any time.
Strategic view in the Fiori Cockpit
Evaluations with various filter and sorting criteria
Free and need-based composition
Step 3: Documented compliance
Complete
d
Rejected
In Progress Not started
- 27 -
25. Real-time monitoring of your SAP systems bRobots.
Your advantages at a glance:
- 28 -
Intelligent detection of suspicious (business) activities.
Dynamic integration of release workflows in case of critical changes.
Free maintenance of decision criteria, without programming effort.
Automatic alerting of critical and complex events, customized for your company.
Continuous software updates keep your systems up to date.
+
+
+
+
+
- 28 -