in your SAP
View the complete webinar:
Enterprise Cybersecurity in SAP Environments
Learn how to continuously monitor and detect cyberthreats and secure your SAP environments.
SAP offers flexibility, but it comes with a price: developers may inadvertently introduce security holes which could pose serious dangers to your business.
We will look at all the possible threats that may come from both internal development as well as external attacks, with special attention to SQL injection attacks, use of dynamic SQL, inexistent or incorrect authorization checks, kernel calls and issues related to robustness among others.