Cybersecurity for SAP (SAP PRESS)
Author:Gaurav Singh (Author), Gaurav Singh, Juan Perez-Etchegoyen (Author), Juan Perez-Etchegoyen
Publisher finelybook 出版社: SAP PRESS
Publication date : 2025-02-26
Edition 版本: New
Language 语言: English
Print Length 页数: 500 pages
ISBN-10: 1493225928
ISBN-13: 9781493225927
Book Description
Protect your SAP system from bad actors! Start by getting a thorough grounding in the why and what of cybersecurity before diving into the how. Create your security roadmap using tools like SAP’s secure operations map and the NIST Cybersecurity Framework (CSF). Then walk through key cybersecurity processes: vulnerability management, threat detection, incident response, disaster recovery, and more. With step-by-step instructions for implementing infrastructure and network security and using tools like SAP Trust Center, this guide will help you safeguard your system!
- Learn to use the secure operations map framework for cybersecurity
- Implement vulnerability management, threat detection, network security, and other cybersecurity techniques in your SAP system
- Map SAP cybersecurity functions to frameworks, standards, and regulatory requirements for compliance
Getting Started
Walk through cybersecurity principles, concepts, and frameworks in the context of your SAP system. Learn why your baseline SAP landscape needs additional cybersecurity protection and which tools can be used to defend which parts.
Implementing Cybersecurity
Establish robust cybersecurity practices in your SAP landscape! Build a review process for patch day, detect anomalies, create a backup strategy, assess the impact of the cloud on your security protocols, and much, much more.
Frameworks and Tools
Discover how to map SAP security functions to standard frameworks like NIST, ISO, and CIS. Explore tools that help you secure your landscape like SAP Trust Center.
- Security architecture
- Secure operations map
- Vulnerability management
- Threat detection
- Incident response
- Business continuity
- Disaster recovery
- Infrastructure security
- Network security
- SAP Trust Center
- Cloud cybersecurity
Editorial Reviews
About the Author
Gaurav Singh is an SAP cybersecurity manager at Under Armour with more than 17 years of experience and a proven track record of helping organizations protect themselves from cyber threats while maximizing their SAP investments. In addition to his cybersecurity leadership role, Gaurav is an accomplished speaker and published author. He has presented at the SAP conference’s cybersecurity track, been featured in international journals, and been recognized as an SAP Insider Expert.
Gaurav’s expertise spans the entire spectrum of SAP security, including identity and access controls; governance, risk, and compliance; vulnerability management; threat management; incident response; and backup and disaster recovery. He is passionate about going beyond traditional SAP security to implement true cybersecurity, covering all aspects of SAP’s secure operations map, from infrastructure to cloud security.
Juan Perez-Etchegoyen is the chief technology officer at Onapsis. JP oversees the research and innovation teams that keep Onapsis on the cutting edge of the business-critical application security market. He is responsible for the design, research, and development of Onapsis’ innovative software solutions, and helps manage the development of new products as well as the SAP cybersecurity research that has garnered critical acclaim for the Onapsis Research Labs.
He is regularly invited to speak and host trainings at global industry conferences including Blackhat, HackInTheBox, Troopers, and SAP TechEd. Prior to joining Onapsis, JP led many information security consultancy projects for companies in Latin America, the U.S., and Europe. His strongest experience is in the fields of penetration testing, web application testing, vulnerabilities research, and information security auditing and standards.