Many organizations running the SAP system have hidden or misunderstood security issues that could result in significant harm if not addressed. In this session we will cover traditional issues related to the authorization concept, such as failure to understand that a focus on TCodes results in an incomplete security model or analysis, as well as emerging risks related to Fiori, Solution Manger, the HANA database, and even cybersecurity. Regardless of your depth of SAP security knowledge, this course is for you.After completing this session, the learner will:
Contact Chapter
Contact ISACA Global Support
JoinBenefitsCredentials
About ISACACommunity Code of ConductISACA Policies ISACA Terms of UseISACA Global Privacy Notice
Chapter Privacy Policy