ON-DEMAND WEBINAR

SAP Cyber Security - how does it work?

A webinar in partnership with SecurityBridge

Now available on-demand

In the past 12 months, cyber-attacks have become more common and more threatening, and that includes attacks on business-critical SAP applications. Nevertheless, many businesses don't have SAP Cyber Security in place as they think they don't have the resources, or that it's too complicated to implement

Watch now

We will always keep your information safe. We ask for the information contained in this form in exchange for a valuable resource. By sharing your information it will also ensure we, and any partners taking part in this webinar, are able to communicate with you in future. We will never send you information about our products and services by email, unless it has been specifically requested.

*We respect your privacy and personal data. By submitting your details and downloading our document you are accepting Turnkey Consulting's privacy policy which can be found here.

Meet your hosts

Team Card
Ed Davis
Managing Director APAC, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Simon Persin
Simon Persin
Global Practice Director, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Shane Kennedy
Shane Kennedy,
Business Development Specialist, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Robert Budic
Robert Budic
Managing Director, Australia, 
Turnkey Consulting
Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries
Team Card
Ed Davis
Managing Director APAC, 
Turnkey Consulting
Simon Persin
Simon Persin
Global Practice Director, 
Turnkey Consulting
Shane Kennedy
Shane Kennedy,
Business Development Specialist, 
Turnkey Consulting
Robert Budic
Robert Budic
Managing Director, Australia, 
Turnkey Consulting
COVER-1

In this webinar, we were joined by Ivan Mans, the CTO at SecurityBridge, to explore how businesses can get a 360-degree view of their SAP Security posture, and ensure their SAP operations are properly secured.

Specifically, this webinar covered:
  • Why it's so important to protect the SAP estate
  • What effective SAP Cyber Security looks like
  • How SecurityBridge can help ensure your SAP systems are secure
  • Insights into how to identify and investigate SAP Cyber Attacks

Supported by:

SecurityBridgeLogo-Vector-grey-Sticker-1

Related webinars

webinar

Beyond the Brownfield Minefield: How to Make Your S/4HANA Migration a True Transformation

webinar

Mind the Gap: Security Responsibilities and Realities in RISE with SAP

webinar

SAP Risk and Assurance Management and the 3 Lines of Defense (3LoD)