Protecting SAP technology is crucial for ensuring data confidentiality, maintaining business continuity, complying with regulatory requirements, and mitigating third-party risks. NO MONKEY is committed to supporting initiatives that bring the necessary expertise, knowledge, and skills together to protect and secure core business applications and make them available for everyone to use.
In this month’s Tackling SAP Security Together, we are delighted to host the leaders of the OWASP Core Business Application Security project. This is a must-attend event for anyone looking for free tools and expertise to better protect their SAP environment.
Who will benefit from this event?
– Cybersecurity professionals
– Information security professionals
– SAP security consultants / experts
The OWASP Core Business Application Security (CBAS) Project is designed to provide guidance and resources for securing critical business applications. The OWASP CBAS Project can help you enhance the security of your organization’s critical business applications, stay up-to-date on the latest security threats and best practices, and connect with other security professionals.
– SAP Security best practices: The OWASP CBAS Project provides a set of best practices for securing business applications. This guidance can help you ensure that your SAP system follows and maintains a standard security baseline.
– Threat research and identification: The project includes resources for researching and identifying threats in SAP applications. This can help you identify and address potential security risks that can be exploited by attackers.
– Collaboration and networking: The project provides opportunities for collaboration and networking with other SAP and IT/Cyber security experts. This can help you share knowledge, exchange ideas, and stay connected with other professionals in the field.
Speakers
Tune in as Waseem Ajrab, Marco Hammel, and Martin Gallo discuss the important aspects of the OWASP CBAS project. They will provide an overview on how the different areas of the project can be utilized within organizations by security professionals, consultants, or internal security teams. They will reveal interesting updates that are planned and provide information on how you can contribute your expertise to the project.