EPI-USE America and Xiting invite you to join them for the first SAP Security Brunch. Hear directly from Juliet Henry, Michael Kummer, and Marius Smit as they share customer success stories, latest security trends, and lessons learned.
Date: Friday, April 14th, 2017
Location: Savor Restaurant at the Westin Atlanta Perimeter North, 7 Concourse Pkwy NE
Atlanta, GA 30328
Seating is limited for this exclusive event; please be sure to register right away to secure your spot using the registration form below. Complimentary valet parking is available for the first 20 registrants. Food and beverages will be served throughout the event.
- 9:00 am – Welcome note
- 9:15 am – 2017 Top Security Trends
- 9:45 am – Break
- 10:00 am – How to simplify the migration of authorizations to SAP S/4HANA
- 10:30 am – Break
- 10:45 am – Data-centric Security
- 11:15 am – How BOSCH simplified the management of GRC-compliant roles
- 11:45 pm – Wrap up & networking
Sessions and presentations
2017 Top Security Trends
To meet the increasing demands of data privacy and protection, organizations are employing a “Security by Design” approach to information security, making it an integral part of the business and a core pillar of applications. Learn about emerging technologies such as blockchain and other security trending frameworks in 2017.
Data Privacy is becoming ever more important for businesses and organizations. Data volumes increase exponentially with technology, and laws and legislation are growing at a rapid pace to keep up. For companies running SAP, simply finding where all the sensitive data resides is a tough challenge. In many cases, the data is being replicated to multiple testing environments, which are typically less stringently managed. Learn how Data Secure allows customers to intelligently mask non-production data, reducing the target for data breaches significantly.
How to simplify the migration of authorizations to SAP S/4HANA
Gain insight into the changes and challenges of SAP S/4HANA. Learn how Bell Food Group simplified such a migration using third-party tools from Xiting. Find out how to automate the analysis of existing authorizations and how to compare them with the new data model of SAP S/4HANA. Learn how to significantly expedite your migration project while lowering the risk of costly mistakes.
How BOSCH simplified the management of GRC-compliant roles
Learn how BOSCH Security Systems simplified the analysis, redesign, maintenance, and testing of GRC-compliant roles and authorizations in SAP. Find out how BOSCH redesigned its roles in just six months and how they did not have a single authorization failure during go-live.