У нас вы можете посмотреть бесплатно Why SAP Is Still a Goldmine for Attackers или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Discover what 20 years of vulnerability research reveals about SAP security TAKEAWAYS • Discover why SAP obscurity no longer works as security • Learn what attackers exploit in real SAP penetration tests • Understand the business impact of SAP breaches (real cases) • Identify common patterns that leave SAP systems vulnerable • Adopt the "assume breach" mindset for SAP environments HOST & GUEST: Waseem Ajrab – Host: Head of Security Advisory, NO MONKEY Joris Van De Vis – Guest: Director Security Research, Security Bridge Chapters 03:06 The Journey into SAP Cybersecurity 05:54 Complexity as a Double-Edged Sword 09:01 The Business Impact of SAP Breaches 12:12 Common Vulnerabilities in SAP Systems 14:54 The Importance of Monitoring and Patching 18:03 The Challenge of Legacy Systems 20:50 The Human Factor in SAP Security 24:55 The Human Element in Technology 27:00 Understanding Compliance vs. Security 30:04 Cloud Migration Myths and Realities 34:15 Identifying Patterns in Vulnerabilities 41:51 Mindset Shift: Assume Breach 43:09 Innovations in SAP Security Tools New episodes drop regularly, featuring conversations with cybersecurity experts, SAP practitioners, and industry leaders who've been in the trenches. No vendor pitches. No fluff. Just actionable insights you can apply today. Because curiosity is free – but recovery isn't!