A Practical Guide to Cybersecurity in SAP A Practical Guide to Cybersecurity in SAP

A Practical Guide to Cybersecurity in SAP

    • 12,99 $
    • 12,99 $

Description de l’éditeur

SAP environments are internally integrated with, and through, cloud and hybrid cloud solutions. This interconnection, both within and external to the firewall, creates a level of vulnerability that, if exploited, could compromise a company’s intellectual property, employee and supplier information, and trade secrets. This book breaks down the application of cybersecurity, as it applies to SAP, into actionable items that can be communicated and implemented into existing security frameworks. You will understand why cybersecurity applies to SAP, how it integrates with cybersecurity Initiatives within an organization, and how to implement a security framework within SAP. This expertly written guide provides a targeted cybersecurity education for SAP managers, architects, and security practitioners. The author explores the technical aspects of implementing cybersecurity policies and procedures using existing tools and available SAP modules. Readers will gain a solid understanding of what a cybersecurity program does, what security frameworks are used for, how to assess and understand risk, and how to apply mitigating controls. By using practical examples, tips, and screenshots, this book covers:

Cyber risk in the SAP landscape
How to harden security
Cybersecurity risk management programs in SA
Risk mitigation for threats

GENRE
Informatique et Internet
SORTIE
2021
8 février
LANGUE
EN
Anglais
LONGUEUR
151
Pages
ÉDITEUR
Espresso Tutorials
VENDEUR
Espresso Tutorials GmbH
TAILLE
2,1
 Mo
Application Security in the ISO27001:2013 Environment Application Security in the ISO27001:2013 Environment
2015
Secure and Resilient Software Development Secure and Resilient Software Development
2010
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
2014
CISSP Cert Guide CISSP Cert Guide
2022
IBM Security Solutions Architecture for Network, Server and Endpoint IBM Security Solutions Architecture for Network, Server and Endpoint
2011
Security Management of Next Generation Telecommunications Networks and Services Security Management of Next Generation Telecommunications Networks and Services
2013