Kick off on Security Master Class

    We are excited to invite you for the upcoming Kick-Off on Security on September 26th. This event promises to be a captivating and insightful exploration into the real world of digital transformation and to secure deployment of cloud applications.

    It will be an event filled with valuable insights, knowledge and expert speakers.

    One of the key topics we’ll be diving into is the critical role of Identity Access Management (IAM) in authorization within secure digital environments. IAM is a fundamental component in safeguarding data and systems.

    Join us to explore these themes and more. Whether you are an IT professional, a security expert, or simply interested in the future of digital security, this event is for you.

    Agenda

    09h30 – 10h00

    Welcome Coffee

    10h00 – 10h15

    Gert De Pauw

    SAPience

    President


    Intro SAPience and SAPience Focus leads Security

    Intro - Sigrid Conix & Annelies Vervoort

    10h15 – 10h45

    Koen Claesen

    SAP

    Cyber Security Advisor


    Building Trust in the Cloud

    In today's economic, geopolitical, and digital transformation landscape, it is widely recognized that cybersecurity has become a top priority for every enterprise. However, this priority brings increasing complexity and cost due to the constantly evolving threat environment and the critical need to safeguard sensitive data and systems. To address these challenges, SAP leverages its legacy of excellence, with thousands of organizations worldwide relying on SAP for secure cloud operations and solutions designed to protect their SAP applications and data.In today's economic, geopolitical, and digital transformation landscape, it is widely recognized that cybersecurity has become a top priority for every enterprise. However, this priority brings increasing complexity and cost due to the constantly evolving threat environment and the critical need to safeguard sensitive data and systems. To address these challenges, SAP leverages its legacy of excellence, with thousands of organizations worldwide relying on SAP for secure cloud operations and solutions designed to protect their SAP applications and data.

    10h45 – 11h30

    Vincent Doux

    SAP

    SAP GRC & Security Customer Solution Advisor for EMEA One


    SAP Identity Access Management strategy

    An overview of new SAP Identity Access Management strategy, including
    • SAP BTP Identity Services Overview
    • SAP Identity Access Governance Overview
    • SAP Access Governance roadmap insight
    o SAP IAG
    o SAP Access Control
    o All other SAP GRC solutions
    • Example of customer projects feedbacks

    11h30 – 12h15

    Johan Wouters

    Expertum

    SAP Security and GRC Senior Consultant


    Compliant Access in the Cloud with Identity Access Governance (IAG)

    SAP business applications are increasingly being deployed in the Cloud.
    In order to manage the access to these applications, SAP offers IAG as a Software-as-a-Service (SaaS).
    We will explain what IAG can do for you.

    12h15 – 13h15

    Lunch

    13h30 – 14h15

    Heidi Van Beethoven

    TheValueChain

    SAP Consultant


    Navigating the Maze of Authorizations in SAP S/4HANA Cloud Public Edition

    In SAP S/4HANA Cloud Public Edition the authorization concept for Business Users is role-based. The Roles assigned to Business Users can be pre-delivered SAP Business Roles, Customized Roles with changed content, restrictions in access level, entities or others. Each Role is linked to a Price Category, very important for License Compliancy. Next to this there are Leading and Derived Roles to make role assignments per entity easier. And most of these roles get updated with scope item activations, hotfixes and upgrades twice a year. All this can be quite a challenge for Role Maintenance. So where to start from? Let me guide you through the exciting world of Authorizations in SAP S/4 HANA Cloud Public Edition!

    14h15 – 15h00

    Tom Dhooghe

    Flexso

    Solution Architect


    SAP SSO and Identity Management Best Practices

    Let's dive into how to leverage these tools effectively as we take you through Identity and Access Management best practices like role-based access, important considerations such as user identity fragmentation, guidelines such as a central CIS tenant, and our lessons learned across dozens of SAP Cloud, SaaS and CIS implementations.

    15h00 – 15h30

    Coffee break

    15h30 – 16h15

    Steven Van Geel

    Flexso

    SAP Consultant


    Google 3rd party cookies in SAP Cloud

    Join us in this session where we get to the bottom of these changes and what we've learned in preparing our customer's environments for the new .cloud.sap world.

    16h15 – 16h30

    Closing & Q&A

    16h30 – 17h30

    Networking Drink