Attacks on Crown Jewels: SAP Vulnerabilities and Exploits

  • Wednesday, April 22, 2015 | 11:30 AM – 12:20 PM | North | Room: 133

View all Sessions

Join us to learn which are the most critical SAP security vulnerabilities, public exploits and defense strategies. Learn through live attack demos, opensource tools and war stories how to check whether your company is securing everything but its crown jewels. Understand how attackers can easily steal confidential data, modify critical information and disrupt key business processes.


This document was retrieved from on Wed, 26 Oct 2016 17:09:58 -0400.
© 2016 EMC Corporation. All rights reserved.