A Practical Guide to Cybersecurity in SAP A Practical Guide to Cybersecurity in SAP

A Practical Guide to Cybersecurity in SAP

    • $9.99
    • $9.99

Publisher Description

SAP environments are internally integrated with, and through, cloud and hybrid cloud solutions. This interconnection, both within and external to the firewall, creates a level of vulnerability that, if exploited, could compromise a company’s intellectual property, employee and supplier information, and trade secrets. This book breaks down the application of cybersecurity, as it applies to SAP, into actionable items that can be communicated and implemented into existing security frameworks. You will understand why cybersecurity applies to SAP, how it integrates with cybersecurity Initiatives within an organization, and how to implement a security framework within SAP. This expertly written guide provides a targeted cybersecurity education for SAP managers, architects, and security practitioners. The author explores the technical aspects of implementing cybersecurity policies and procedures using existing tools and available SAP modules. Readers will gain a solid understanding of what a cybersecurity program does, what security frameworks are used for, how to assess and understand risk, and how to apply mitigating controls. By using practical examples, tips, and screenshots, this book covers:

Cyber risk in the SAP landscape
How to harden security
Cybersecurity risk management programs in SA
Risk mitigation for threats

GENRE
Computers & Internet
RELEASED
2021
February 8
LANGUAGE
EN
English
LENGTH
151
Pages
PUBLISHER
Espresso Tutorials
SELLER
Espresso Tutorials GmbH
SIZE
2.1
MB
Application Security in the ISO27001:2013 Environment Application Security in the ISO27001:2013 Environment
2015
Secure and Resilient Software Development Secure and Resilient Software Development
2010
Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security Using the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security
2014
CISSP Cert Guide CISSP Cert Guide
2022
IBM Security Solutions Architecture for Network, Server and Endpoint IBM Security Solutions Architecture for Network, Server and Endpoint
2011
Security Management of Next Generation Telecommunications Networks and Services Security Management of Next Generation Telecommunications Networks and Services
2013