SAP Cybersecurity by NO MONKEY

Why SAP Is Still a Goldmine for Attackers


Listen Later

Discover what 20 years of vulnerability research reveals about SAP security

TAKEAWAYS

• Discover why SAP obscurity no longer works as security
• Learn what attackers exploit in real SAP penetration tests
• Understand the business impact of SAP breaches (real cases)
• Identify common patterns that leave SAP systems vulnerable
• Adopt the "assume breach" mindset for SAP environments

HOST & GUEST:

Waseem Ajrab – Host: Head of Security Advisory, NO MONKEY
Joris Van De Vis – Guest: Director Security Research, Security Bridge

Chapters

03:06 The Journey into SAP Cybersecurity

05:54 Complexity as a Double-Edged Sword
09:01 The Business Impact of SAP Breaches
12:12 Common Vulnerabilities in SAP Systems
14:54 The Importance of Monitoring and Patching
18:03 The Challenge of Legacy Systems
20:50 The Human Factor in SAP Security
24:55 The Human Element in Technology
27:00 Understanding Compliance vs. Security
30:04 Cloud Migration Myths and Realities
34:15 Identifying Patterns in Vulnerabilities
41:51 Mindset Shift: Assume Breach
43:09 Innovations in SAP Security Tools

New episodes drop regularly, featuring conversations with cybersecurity experts, SAP practitioners, and industry leaders who've been in the trenches. No vendor pitches. No fluff. Just actionable insights you can apply today.

Because curiosity is free – but recovery isn't.

...more
View all episodesView all episodes
Download on the App Store

SAP Cybersecurity by NO MONKEYBy Waseem Ajrab