Requirements for Securing Cloud-Based Systems

As organizations accelerate the move of enterprise applications and data into cloud-based and cloud-resident systems, it’s extremely important to ensure that security is in place early to avoid having to backtrack and address these issues. Whether systems are running in Software-as-a-Service, Platform-as-a-Service, or Infrastructure-as-a-Service environments, each deployment offers unique security challenges. This track will help you understand how you can best prepare for the move to the cloud, the steps that you need to take to secure your systems, as well as planning for how to protect your data and identify potential threats to your systems.

Sessions at SAPinsider Cybersecurity2021:

How the Swiss Federal Administration planned their SAP S/4HANA move with security by design in mind– Sinsa Medic

Hardly any other domain has changed as much as cybersecurity in recent years and ensuring SAP security in a dynamic environment is a constant challenge.

As SAP Systems are being more integrated with other (Cloud) solutions, they are nowadays increasingly exposed to higher risks. The extensive use of cloud components is changing the attack vectors of many SAP customers as they experience how SAP S/4HANA migration rapidly leads to a hybrid SAP ecosystem. Very soon the pressure to act increases and SAP customers realize traditional concepts for SAP security are less effective within hybrid landscapes and agile methodologies.

It is time to take back control and build your SAP ecosystem securely from scratch. The earlier security is taken into account, the better, and the migration to SAP S/4HANA is an ideal time to eliminate security deficiencies.

Security must be timely considered in the migration process and “security by design” seems to be a valid approach for this challenge. In this session you will learn how the swiss federal administration adopted this principle within their SAP S/4HANA migration program that was executed with the SAFe methodology, where they defined security by design as an architecture principle.

Take a deep dive and learn how the swiss federal administration is managing SAP Security within its SAP S/4HANA migration program and attend this comprehensive session to:

  • Learn what’s security by design and how it can be implemented in a SAP S/4HANA migration project
  • Learn how to fill the gaps from the SAP Secure Operations Map and extend it to a holistic SAP Security Framework
  • Get practical tips and lessons learned on how to plan your SAP S/4HANA migration considering security by design
  • Learn how to execute and orchestrate SAP Security by design within an agile environment

The business benefits of SAP Enterprise Threat Detection- Arndt Lingscheid

Nowadays, not a day goes by without a new data breach being reported in the news. Cyber-attacks often target our IT infrastructure using phishing, smishing, ransomware or malware. The goal is often to disrupt a company’s operations, encrypt databases or block access to carry out extortion.

The average time to contain a security breach is 280 days. Such a long-lasting attack on an SAP S/4HANA Finance application can have even more serious consequences for an organization than an attack on the IT infrastructure if it results in the loss of important data and money and thus violates compliance regulations. In addition, threats to the application environment such as SAP S/4HANA and the IT infrastructure must be equally considered in the risk management of the entire organization.

Enterprise Threat Detection makes suspicious (user) behavior and anomalies in SAP S/4HANA business applications transparent in real time to detect and stop such security breaches in real time.

  • Businesses that had not deployed security automation saw an average total cost of $6.03 million, more than double the average cost of a data breach of $2.45 million for businesses that had fully deployed security automation
  • The time to contain a security breach on average is 280 days
  • Lost business costs $1.52 million accounted for nearly 40% of the average total cost of a data breach

It’s not a question of experiencing a data breach. It’s only a question WHEN!

Join this session to:

  • Understand how you can benefit from SAP Enterprise Threat Detection to protect the intelligent enterprise by identifying, analyzing and neutralizing cyber-attacks on your SAP S/4HANA Finance applications
  • Discover how security incidents are detected and analyzed and how evidence of an attack is collected and secured
  • Learn how to adopt and adapt specific use cases according to your individual application and company policies

Creating a cybersecurity risks dashboard in the SAP Analytics Cloud- Gabriele Fiata

When it comes to securing SAP S/4HANA business applications, organizations tend to face three key challenges: 1) How to enable the application security team to prioritize the necessary cybersecurity actions; 2) How to give the CISO insight into application security risk activities; 3) How to bridge the gap between the problems faced by the CISO and the problems faced by the rest of the C-suite.

One potential way to address these challenges is by building a cybersecurity dashboard using SAP Analytics Cloud and its integration with SAP security solutions, a concept in which several SAP customers have expressed interest, and which SAP is planning to build by working together with customers.

The idea is to create a customizable dashboard that combines the feeds from various cybersecurity solutions, analyzes attacks, and suggests actions for the application security team to prioritize. The dashboard would also give CISOs a snapshot of what their teams are doing at any point in time so they can adjust operations if necessary. In addition, the dashboard would help the board understand how cybersecurity risks can affect strategic business objectives, and make better decisions based on risk mitigation, by providing insight into the monetary value of cybersecurity risks and into the company’s overall risk management status.

Join this session to:

  • Understand the organizational benefits of creating a cybersecurity dashboard.
  • Explore the different types of information that can be included in the dashboard.
  • Learn how you can create a dashboard in SAP Analytics Cloud

Case study on threat detection in SAP applications and implementation of SAP Enterprise Threat Detection – Daniil Luzin and Andrei Nifatov

An important component of a comprehensive security strategy is the control over activities performed within the SAP S/4HANA environment to ensure compliance of the SAP landscape. This includes monitoring the behavior of applications with respect to policies and regulatory requirements, such as data protection requirements.

This customer case study shows the customer situation before implementing SAP Enterprise Threat Detection:

  • Central SIEM solution was already implemented at the IT infrastructure level
  • No visibility of threats in the SAP landscape
  • Uncertainty about security and compliance measures in the SAP S/4HANA environment
  • No control over user and system behavior

During the project, the customer was able to provide enterprise-wide visibility of threats within the IT infrastructure and SAP S/4HANA applications, improve credential secrecy and superuser monitoring in SAP S/4HANA, correlate IT and application events, and implement general improvements in basic settings (trust relationships, background jobs, technical users, integration scenarios, etc.).

Attend this session to:

  • Learn about a customer implementation of SAP Enterprise Threat Detection
  • Understand the benefits SAP Enterprise Threat Detection brings around creating visibility of potential threats within the organization
  • Determine how to remove uncertainty and improve control over user and system behavior

Overview of SAP cybersecurity and data protection solutions– Arndt Lingscheid

Cyber-attacks can have severe consequences when it comes to SAP S/4HANA applications. These attacks focus on the company’s application layer and use privileged user accounts. Unfortunately, many security departments see the SAP application layer as a “black box,” and assume the security of SAP applications as the responsibility of their Basis or SAP application colleagues, leaving these applications at risk.

Securing an SAP S/4HANA business application environment involves more than roles and authorizations. The loss of sensitive data can lead to severe penalties, damages reputation, and endanger the overall business of businesses within minutes.

In this session, you will:

  • Understand the challenges and needs to secure your SAP landscape
  • Know how security frameworks can help lay the foundation for a strong security strategy
  • Explore SAP’s portfolio of security and compliance solutions through the lens of the Cybersecurity Framework provided by the National Institute of Standards and Technology (NIST)
  • Get overview to the toolkit for creating a comprehensive security strategy to meets your unique needs
  • Learn to control the activities with a security infrastructure to meet compliance and business requirements and get insight that helps those at the C level make better decisions

Explore all Cybersecurity2021 Sessions

All Cybersecurity2021 Tracks:

Additional Resources:

Research Report:

Enterprise Cloud Deployment: State of the Market

Digital transformation and the deployment of applications in the cloud has been a key topic of discussion within the enterprise software market for several years but that conversation has been accelerated by the global events of 2020. Organizations whose workforces had been entirely on-site have had to quickly convert to a remote work environment. Many of those companies have scrambled to address critical infrastructure changes and implement cloud-based applications to provide faster and more reliable access for remote users.

This Event is Sponsored by:

EXPLORE BY TOPIC



More Resources

See All Related Content