Attacks on Crown Jewels: SAP Vulnerabilities and Exploits

  • Wednesday, April 22, 2015 | 11:30 AM – 12:20 PM | North | Room: 133

View all Sessions

Join us to learn which are the most critical SAP security vulnerabilities, public exploits and defense strategies. Learn through live attack demos, opensource tools and war stories how to check whether your company is securing everything but its crown jewels. Understand how attackers can easily steal confidential data, modify critical information and disrupt key business processes.


This document was retrieved from on Mon, 15 Jul 2019 18:21:30 -0400.