Event Presentations

Our Conference Presentation Library contains hundreds of SAPinsider event presentations, putting the insights and guidance of SAP experts and professional speakers at your fingertips. Flip through thousands of slides to obtain first-hand knowledge of the actionable content delivered at SAPinsider’s annual events.

Featured

  1. Demand for Diverse Perspectives: Women Leaders in SAP and Tech

  2. Case Study: Alphabet’s SAP on Google Cloud Journey-Experiences and Innovations

  3. End-to-End Security Strategies for SAP S/4HANA

Results

  1. Streamlining End to End Supply Chain with Rodan+Fields

    The migration to HANA gives companies the opportunity to move their SAP environment to AWS, Microsoft Azure or Google Cloud. Moving SAP to the cloud promises to improve operations, offer better security, and reduce costs, but to experience significant cost reductions, the cloud size needs to change dynamically based on the systems’ actual performance and…
  2. The roadmap to Cybersecurity

    Are you eager to deepen your knowledge about SAP Security, SAP Data Protection products and services? Securing an SAP S/4HANA business application environment involves more than perimeter security and roles & authorizations. The loss of sensitive data can result in severe penalties, damage reputation and endanger a company’s entire business within minutes. In this session…
  3. Panel Discussion: Best practices for building your SAP security strategy

    Companies face a rapidly challenging environment as they seek to protect their SAP systems, without losing their ability to maximize the value of their technology investments. This session will provide you with insight into where you should start to ensure that your SAP systems are protected. SAPinsider’s industry experts will share with you how to…
  4. Panel Discussion: Customer Experiences with Cybersecurity

    All SAP customers have solutions in place that they can use for securing their SAP systems. This typically involves SAP Solution Manager as that is used by most organizations for maintenance and patch deployment but may also include other SAP and non-SAP tools that have different roles and capabilities. This panel will allow attendees to…
  5. How to prioritize security measures to avoid an SAP data breach

    With the increasing number of Cyberattacks in different forms, organizations need to avoid the high cost and significant business impact of a potential SAP data breach. Traditional network security does not provide adequate protection of the data in your SAP systems against insider and outsider attacks. In this session, John Mortimer, Security Consultant at CyberSafe,…
  6. Securing SAP Systems from Cyber Attack with SAP Solution Manager

    Protecting SAP systems against advanced cyber threats using standard tools available to all SAP support customers is vital. This includes System Recommendations for patch management, Configuration Validation for vulnerability management, System Monitoring for threat detection, and Guided Procedures for incident response. Some important questions are: – How can I manage cyber threats with tools that…
  7. Protecting SAP with an Adaptive Security Model

    Agility is the name of the game in today’s SAP security landscape. Being able to detect threats as they happen, quickly address vulnerabilities, and continuously improve your security posture is crucial to protecting your SAP data and your business as a whole. However, getting here is a challenge in itself. One strategy that is helping…
  8. Keynote: Trends and decisions for securing your SAP systems

    SAPinsider recently surveyed 263 members of our community to understand the most important factors for securing their SAP systems. “By far the greatest need for survey respondents (56%) was that of protecting access to sensitive and confidential data”. This session will present findings from that research including what strategies SAPinsiders are taking and the requirements…
  9. Protecting the mission-critical applications that run your business

    Over the last few months, everywhere you turn, there’s another story about debilitating ransomware attacks on mission-critical or business-critical systems. From fuel and energy companies to food processing companies, no industry is safe or immune. The traditional ways in which we respond to ransomware attacks no longer are as effective. What’s needed is a new…
  10. 3 Pillars for long-term automation success

    Automation is not a short-term project, but a long-term strategy. Ensuring consistent success and benefits requires that companies establish solid institutional foundations to drive automation governance, criteria for measuring success, and continuous improvement. To make the path ahead clear, 3 Pillars for Long Term Automation Success helps participants unlock their organization’s potential and turn automation…