Attacks on Crown Jewels: SAP Vulnerabilities and Exploits

  • Wednesday, April 22, 2015 | 11:30 AM – 12:20 PM | North | Room: 133

View all Sessions

Join us to learn which are the most critical SAP security vulnerabilities, public exploits and defense strategies. Learn through live attack demos, opensource tools and war stories how to check whether your company is securing everything but its crown jewels. Understand how attackers can easily steal confidential data, modify critical information and disrupt key business processes.


This document was retrieved from on Sun, 17 Dec 2017 16:26:01 -0500.
© 2017 EMC Corporation. All rights reserved.