Webinar

How to minimise cyber attacks on SAP applications

An on-demand webinar in collaboration with SAP

Many security experts have warned that recently published, easy-to-use exploits for known SAP security issues may lead to more attacks on SAP systems. These exploits may enable remote hackers to compromise SAP applications and the critical business data they contain.

Watch now

We will always keep your information safe. We ask for the information contained in this form in exchange for a valuable resource. By sharing your information it will also ensure we are able to send you educational information in future that we think will be of real value to you. We will never send you information about our products and services by email unless it has been specifically requested.

*We respect your privacy and personal data. By submitting your details and downloading our document you are accepting Turnkey Consulting's privacy policy which can be found here.

Meet your hosts

Team Card
Ed Davis
Managing Director APAC, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Simon Persin
Simon Persin
Global Practice Director, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Shane Kennedy
Shane Kennedy,
Business Development Specialist, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Robert Budic
Robert Budic
Managing Director, Australia, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Team Card
Ed Davis
Managing Director APAC, 
Turnkey Consulting
Simon Persin
Simon Persin
Global Practice Director, 
Turnkey Consulting
Shane Kennedy
Shane Kennedy,
Business Development Specialist, 
Turnkey Consulting
Robert Budic
Robert Budic
Managing Director, Australia, 
Turnkey Consulting
architecture-1048092-min

In this on-demand webinar, we look at how you can monitor and eliminate both external and internal threats occurring within the SAP landscape. Turnkey’s own security expert, Tom Smith is joined by Paul Lloyd-Smith from SAP’s Office of the CFO.

Tom and Paul explore some simple use cases for SAP Enterprise Threat Detection (ETD), such as alerting when an attacker creates a new user and subsequently logs in - showcasing the ease of pattern creation and execution within ETD. And they also introduce how ETD manages alert investigations and exemptions to take issues to completion.

Related webinars

webinar

AI in SAP: Balancing Opportunity, Risk, and Control

webinar

Beyond the Brownfield Minefield: How to Make Your S/4HANA Migration a True Transformation

webinar

Mind the Gap: Security Responsibilities and Realities in RISE with SAP