What You Need to Know Before
You Start

Starts 7 July 2025 11:05

Ends 7 July 2025

00 Days
00 Hours
00 Minutes
00 Seconds
course image

Exposing the Dark Corners of SAP - 4 Years of Threat Intelligence Data Analyzed

Join us in deep diving into an analysis of four years of threat intelligence data, shedding light on the tactics of threat actors targeting SAP applications. Discover emerging vulnerability trends and understand why ERP security is increasingly critical for current cybersecurity professionals.
Black Hat via YouTube

Black Hat

2891 Courses


38 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Free Video

Optional upgrade avallable

Overview

Join us in deep diving into an analysis of four years of threat intelligence data, shedding light on the tactics of threat actors targeting SAP applications. Discover emerging vulnerability trends and understand why ERP security is increasingly critical for current cybersecurity professionals.

Syllabus

  • Introduction to SAP Security
  • Overview of SAP Applications
    Importance of ERP Security in Today's Landscape
  • Understanding Threat Intelligence
  • Definition and Importance of Threat Intelligence
    Methods of Gathering and Analyzing Threat Data
  • Analysis of 4 Years of Threat Data
  • Overview of Collected Data
    Key Findings and Statistics
  • Vulnerability Trends in SAP Applications
  • Common Vulnerabilities in SAP Systems
    Exploit Patterns and Techniques by Threat Actors
    Case Studies of Notable Vulnerability Exploits
  • Threat Actors Targeting SAP Applications
  • Profiling Threat Actors
    Motivations and Objectives of Attackers
  • Risk Management and Mitigation Strategies
  • Best Practices for Securing SAP Environments
    Tools and Technologies for SAP Security
    Incident Response and Recovery Planning
  • The Future of SAP Security
  • Emerging Threats and Challenges
    Innovations in ERP Security Solutions
  • Case Studies and Real-World Examples
  • Analyzing Past Attack Scenarios
    Lessons Learned from Industry Incidents
  • Conclusion
  • Recap of Key Learnings
    Importance of Continuous Security Monitoring in ERP Systems
  • Additional Resources
  • Recommended Reading and Tools
    Workshops and Certifications in ERP Security

Subjects

Business