Winterhawk – How secure is your non-production SAP data?
How secure is your non-production SAP data?
Thursday, May 21, 2015 – 10:30AM BST
The protection of sensitive data within SAP is under intense scrutiny at present. There is an escalating susceptibility of data to security breaches as well as an increasing awareness of security vulnerabilities. In the light of the three main causes of data violations namely, human error, malicious attacks and system failure, it becomes obvious that the management and protection of sensitive information in your SAP landscape is crucial.
Whatever the cause, data breaches are costly and, when you add the stringent legal requirements for data protection, privacy and certification, it becomes critical to understand the field of data protection and its related requirements.
Speakers
Paul Hammersley / EPI-USE Labs
As VP Landscape and Data Services which includes System Landscape Optimisation at EPI-USE Labs, Paul has been involved in many data management, anonymisation projects and SAP migrations across the globe.
EPI-USE Labs creates products and services that boost the performance and management of SAP data. The company is a SAP-certified partner, its solutions being used daily in many of the most renowned businesses across the world to bring measureable improvements in the use of time, money, system operations and all-round performance. www.epiuselabs.com
|
Elodie Ellingsen / Winterhawk
As Director Operations – EMEA, Elodie has over 17 years SAP implementation and upgrade experience across a wide variety of industries. She specialises in SAP Security, SAP role designs and leading SAP Security and SoD Remediation teams. Prior to joining Winterhawk, she worked in Canada, USA and the United Kingdom.
Winterhawk offers comprehensive solutions and services related to SAP GRC, Security, Role Design, Fraud and Audit Management. Winterhawk utilises sophisticated methodologies and tool sets to provide cost effective, high quality customer focused solutions that enable customers to optimise their value in Security and GRC spend.
|