What You Need to Know Before
You Start
Starts 8 June 2025 12:42
Ends 8 June 2025
00
days
00
hours
00
minutes
00
seconds
Exposing the Dark Corners of SAP - 4 Years of Threat Intelligence Data Analyzed
Dive into an analysis of 4 years of threat intelligence data revealing how threat actors target SAP applications, vulnerability trends, and why ERP security deserves more attention from security professionals.
Black Hat
via YouTube
Black Hat
2544 Courses
38 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Free Video
Optional upgrade avallable
Overview
Dive into an analysis of 4 years of threat intelligence data revealing how threat actors target SAP applications, vulnerability trends, and why ERP security deserves more attention from security professionals.
Syllabus
- Introduction to SAP Security
- Understanding Threat Intelligence
- Analysis of 4 Years of Threat Data
- Vulnerability Trends in SAP Applications
- Threat Actors Targeting SAP Applications
- Risk Management and Mitigation Strategies
- The Future of SAP Security
- Case Studies and Real-World Examples
- Conclusion
- Additional Resources
Overview of SAP Applications
Importance of ERP Security in Today's Landscape
Definition and Importance of Threat Intelligence
Methods of Gathering and Analyzing Threat Data
Overview of Collected Data
Key Findings and Statistics
Common Vulnerabilities in SAP Systems
Exploit Patterns and Techniques by Threat Actors
Case Studies of Notable Vulnerability Exploits
Profiling Threat Actors
Motivations and Objectives of Attackers
Best Practices for Securing SAP Environments
Tools and Technologies for SAP Security
Incident Response and Recovery Planning
Emerging Threats and Challenges
Innovations in ERP Security Solutions
Analyzing Past Attack Scenarios
Lessons Learned from Industry Incidents
Recap of Key Learnings
Importance of Continuous Security Monitoring in ERP Systems
Recommended Reading and Tools
Workshops and Certifications in ERP Security
Subjects
Business