Home
Categories
EXPLORE
True Crime
Comedy
Business
Society & Culture
Sports
News
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/dd/94/0a/dd940ad1-28c7-3051-1249-e300b427e9ee/mza_16661511549264765011.png/600x600bb.jpg
SAP Cybersecurity by NO MONKEY
Waseem Ajrab
2 episodes
17 hours ago
Welcome to SAP Cybersecurity by NO MONKEY – where we make SAP security real, relevant, and actionable. Hosted by Waseem Ajrab, this podcast breaks down the complexities of SAP cybersecurity into conversations that matter. Whether you're a CISO, SAP admin, SOC analyst, or auditor, we tackle the challenges you face every day: securing critical SAP environments, bridging the gap between security and business, and protecting the digital backbone of global operations. With over 500,000 SAP customers running critical business processes, securing these systems isn't just an IT issue – it's a business imperative. But SAP security doesn't have to be intimidating or isolated. Through expert interviews and practical insights, we explore: - Real-world attack vectors and defense strategies - How to connect SAP security with SOC operations - Cloud security challenges in SAP BTP environments - Building effective collaboration between IT Security, SAP teams, and business leaders - Turning cybersecurity from a cost center into a business enabler NO MONKEY's approach is simple: People → Process → Technology. We believe security starts with empowering the right people, establishing smart processes, and only then choosing the right tools. New episodes drop regularly, featuring conversations with cybersecurity experts, SAP practitioners, and industry leaders who've been in the trenches. No vendor pitches. No fluff. Just actionable insights you can apply today. Because curiosity is free – but recovery isn't.
Show more...
Technology
Business,
News,
Management,
Tech News
RSS
All content for SAP Cybersecurity by NO MONKEY is the property of Waseem Ajrab and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to SAP Cybersecurity by NO MONKEY – where we make SAP security real, relevant, and actionable. Hosted by Waseem Ajrab, this podcast breaks down the complexities of SAP cybersecurity into conversations that matter. Whether you're a CISO, SAP admin, SOC analyst, or auditor, we tackle the challenges you face every day: securing critical SAP environments, bridging the gap between security and business, and protecting the digital backbone of global operations. With over 500,000 SAP customers running critical business processes, securing these systems isn't just an IT issue – it's a business imperative. But SAP security doesn't have to be intimidating or isolated. Through expert interviews and practical insights, we explore: - Real-world attack vectors and defense strategies - How to connect SAP security with SOC operations - Cloud security challenges in SAP BTP environments - Building effective collaboration between IT Security, SAP teams, and business leaders - Turning cybersecurity from a cost center into a business enabler NO MONKEY's approach is simple: People → Process → Technology. We believe security starts with empowering the right people, establishing smart processes, and only then choosing the right tools. New episodes drop regularly, featuring conversations with cybersecurity experts, SAP practitioners, and industry leaders who've been in the trenches. No vendor pitches. No fluff. Just actionable insights you can apply today. Because curiosity is free – but recovery isn't.
Show more...
Technology
Business,
News,
Management,
Tech News
https://images.podigee-cdn.net/0x,sHmNZQtUSvi-1hTvAnIaIxwgDyNJizKdEKBEXKKuxSX4=/https://main.podigee-cdn.net/uploads/u80384/49a06ab2-4bcf-4f57-a16c-51e32452d4ec.png
Uncovering SAP BTP Attack Vectors
SAP Cybersecurity by NO MONKEY
46 minutes
2 days ago
Uncovering SAP BTP Attack Vectors
In this episode of SAP Cybersecurity, host Waseem Ajrab and guest Julian Petersohn delve into the complexities of SAP security, particularly focusing on the SAP Business Technology Platform (BTP). They discuss the shift from on-premise to cloud environments, the implications for security, and the various attack vectors that arise in this new landscape. The conversation emphasizes the importance of understanding shared responsibilities in cloud security, the significance of proper configuration, and the need for continuous monitoring. They also explore specific attack vectors related to Cloud Foundry and Kyma, and provide actionable recommendations for organizations to enhance their security posture in the BTP environment.
SAP Cybersecurity by NO MONKEY
Welcome to SAP Cybersecurity by NO MONKEY – where we make SAP security real, relevant, and actionable. Hosted by Waseem Ajrab, this podcast breaks down the complexities of SAP cybersecurity into conversations that matter. Whether you're a CISO, SAP admin, SOC analyst, or auditor, we tackle the challenges you face every day: securing critical SAP environments, bridging the gap between security and business, and protecting the digital backbone of global operations. With over 500,000 SAP customers running critical business processes, securing these systems isn't just an IT issue – it's a business imperative. But SAP security doesn't have to be intimidating or isolated. Through expert interviews and practical insights, we explore: - Real-world attack vectors and defense strategies - How to connect SAP security with SOC operations - Cloud security challenges in SAP BTP environments - Building effective collaboration between IT Security, SAP teams, and business leaders - Turning cybersecurity from a cost center into a business enabler NO MONKEY's approach is simple: People → Process → Technology. We believe security starts with empowering the right people, establishing smart processes, and only then choosing the right tools. New episodes drop regularly, featuring conversations with cybersecurity experts, SAP practitioners, and industry leaders who've been in the trenches. No vendor pitches. No fluff. Just actionable insights you can apply today. Because curiosity is free – but recovery isn't.