Three days. Real-world SAP strategies. Hands-on learning. A community that gets it. Don’t miss your chance to be part of it.
Tracks & Topics
Pre-Conference: March 16, 2026
Expo & Conference: March 17-19, 2026
Las Vegas, Nevada

Cybersecurity
This track is designed for IT leaders and security professionals responsible for safeguarding SAP landscapes and critical enterprise systems. Sessions address evolving attack vectors, regulatory requirements, and advanced defense strategies to build secure, resilient, and compliant SAP environments.
Key topics
| Accelerating SAP Security: Smarter Incident Response with Onapsis and Microsoft Sentinel for SAP | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2025 was a dramatic wake-up call for business-critical application security, marked by critical zero-days, public exploits, and a significant rise in sophisticated, targeted attacks against SAP systems globally. Security Operations Center (SOC) teams are struggling to keep pace, frequently lacking the deep SAP threat insights and specialized exploit detection necessary to defend these complex, mission-critical assets effectively. This session will provide security professionals with an in-depth, educational look at the new threat landscape, detailing the latest tactics, techniques, and procedures (TTPs) used by threat actors to directly compromise SAP applications. You will learn:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Ask the Experts: Rowena Dsouza and Anne Marie Colombo | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Ask the Experts sessions provide an informal setting to connect one-on-one with subject matter experts and experienced end users on specific areas of expertise. Bring your pressing questions and be ready to discuss your key challenges and priorities. Topics covered: Zero Trust, Private Cloud ERP Security aligned to SAP Shared Responsibility | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Case Study: Practical Cyber Resilience Strategies for SAP S/4HANA Cloud with Merck | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Hear how Merck, a global leader in healthcare, science, and technology, has developed a cyber resilience strategy for their SAP S/4HANA Cloud environment using Zero Trust principles in the S/4HANA Private Cloud. Lessons learned emphasize collaboration, proactive security, SAP and partner technologies, user engagement, and an understanding of shared responsibilities. By attending this session, attendees will leave with ideas to strengthen their security posture and address evolving cyber threats in the SAP S/4HANA environment. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Case Study: SAP S/4HANA Transformations: Have You Secured Your Integrations? | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
As SAP customers embark on or plan for an SAP S/4HANA transformation, SAP security professionals must prepare for this new frontier. With the Clean Core approach, the SAP landscape is shifting toward an API-first model where SAP BTP, specifically SAP Integration Suite, is central. For organizations coming from the SAP PI/PO world, this this is a new environment with its own limitations and challenges. As SAP Integration Suite becomes the hub for both SAP-to-SAP and SAP-to-non-SAP integrations, the granular RBAC controls familiar from the ABAP/Java world are no longer available in the same way.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Case Study: Turning Vulnerabilities to Value in SAP Security Strategy | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Cybersecurity is no longer just an IT concern — it’s a business imperative. In a world of increasing regulatory pressure, AI-powered threats, and complex digital ecosystems, SAP environments remain high-value targets for cyberattacks. Yet many organisations still struggle to translate technical risks — such as unpatched vulnerabilities, excessive user access, and insecure integrations — into board-level conversations that drive action. Learn how to reframe SAP security from reactive protection to proactive value creation. Explore how to quantify risk in business terms, align with executive priorities, and build security strategies that support trust, compliance, and business continuity. With real-world insights from global operations and transformation programs, you'll leave with a practical framework for elevating cybersecurity to a strategic conversation. You will learn how to:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Customer Panel: Cyber in SAP Transformations: Strategies for Secure Innovation | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
SAP transformations—whether migrating to SAP S/4HANA, adopting SAP BTP, or expanding cloud capabilities—introduce significant cyber risk exposure. As organizations modernize their SAP landscapes, they must navigate complex threat vectors, evolving compliance requirements, and heightened data privacy concerns. Without a robust cyber risk strategy, transformation efforts can be delayed, disrupted, or compromised. This session explores how organizations can embed cyber risk management into the heart of their SAP transformation programs. You will learn how to identify and assess SAP-specific risks, implement controls aligned to transformation milestones, and build governance models that ensure security without slowing innovation. The session will also highlight common pitfalls and lessons learned from real-world SAP transformation projects. You'll leave with actionable strategies to strengthen their security posture across SAP environments, including cloud, hybrid, and on-premise deployments. You will learn how to:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Pre-Conference Session: Mastering SAP Cloud Security: Operationalizing the Shared Responsibility Model Across the SAP Landscape | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
As enterprises accelerate adoption of SAP S/4HANA Cloud, Ariba, and SuccessFactors, the complexity of managing cybersecurity, risk, and compliance across this fragmented ecosystem increases dramatically. This workshop provides a deep dive into how to operationalize the Shared Responsibility Model (SRM) across SAP cloud platforms. Attendees will be guided through a structured methodology to clarify ownership boundaries, embed security and compliance into SAP programs, and define a unified governance model. Interactive exercises and real-world case studies will equip participants with practical tools to identify control gaps, align cyber strategies with enterprise risk frameworks, and drive compliance across hybrid SAP environments. This session is designed for security, risk, and IT executives who want to go beyond theory and return with a blueprint ready to apply across their SAP cloud landscape. You will learn how to:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| SAP GRC Access Control and SAP Cloud Identity Access Governance: What Do They Do and Which One is Right for Your Organization? | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Explore the details of functionality, differentiators, and important platform aspects in the latest SAP GRC On Premise and Cloud provisioning and compliance solutions. Gain detailed insights into the SAP Compliance applications of SAP GRC Access Control 12.0 and SAP Cloud Identity Access Governance and consider which application, platform, and functionality is best for current and long term compliance and provisioning requirements. You will:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Securing AI and Agentic AI in Fast-Moving Business and Technology Transformation | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
AI and Agentic AI promise significant benefits, however, they bring security risks such as breaches of privacy and confidentiality, unauthorized access and action. The unpredictability of Generative AI also poses new risks. We must ensure chat bots, co-pilots and agents stay within their intended scope boundaries and authorizations. Agents that interact with business systems and especially those that can act on users' behalf need to be carefully controlled and these risks multiply when agents start collaborating together. You will learn:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| The Current State of SAP Cybersecurity | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
With the acceleration of cloud adoption, protecting SAP systems has increased both in importance and complexity. This session will address how SAP cybersecurity has changed in recent years, what organizations can do to be better prepared, and the role AI and automation play in the current threat landscape and protecting SAP systems.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| What's on Your Mind? The Real-World Impact of a Security Breach | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
This dynamic discussion session examines recent high-profile cybersecurity breaches to highlight how threats evolve, how attackers exploit vulnerabilities, and how impacts extend far beyond the breached organization. Attendees will learn how disruptions to systems, sensitive data exposure, and compromised third-party relationships can trigger financial losses, regulatory scrutiny, reputational damage, and supply chain instability. The session will also explore broader economic implications, including market volatility and increased operational costs for organizations that were not directly breached. Join this session for an interactive discussion on:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Workshop: The SAP Security Game | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Are you ready to elevate your SAP security expertise? Join us for an immersive and interactive SAP Security Game, crafted to simulate real-world security challenges faced by organizations. Participants will navigate various scenarios designed not only to test but also to enhance their strategic and technical expertise in SAP security. This active session offers an invaluable opportunity to enhance your skills in security planning, compliance management, and breach response while promoting collaboration and learning in a supportive and competitive setting. Throughout the workshop, we will engage with three critical topics including preventative security control implementation, compliance request/audit handling, and security breach response. You will:
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Three days. Real-world SAP strategies. Hands-on learning. A community that gets it. Don’t miss your chance to be part of it.