SEE More Sessions
Hosted by Accenture: The Anatomy of a Breach and How to Protect Your Enterprise
Wed, March 18
,
2:30 PM
-
3:10 PM
In an era where cyberattacks evolve faster than traditional defenses, understanding the anatomy of a breach is essential for any organization embarking on an SAP migration or transformation journey. This session provides a practical, enterprise-level view of how modern attacks unfold—and how to close the gaps before threat actors exploit them. We will deep dive into recent SAP platform attacks and provide step-by-step cyber intelligence details to guide you through the anatomy of a breach. Using a step-by-step walkthrough of real-world incident patterns, we will demystify how breaches progress—from initial foothold to lateral movement, privilege abuse, and data exfiltration.
We will explore security considerations and strategic actions to take preventative measures and/or implement secure-by-design guidelines as part of a migration/ transformation journey. From cloud and infrastructure security, identity and access governance, system hardening, integration security, data privacy and protection, to cyber defense mechanism, attendees will gain clarity on where security controls can fail and how to strengthen and design them.
Finally, we outline respectful and actionable best practices for building a defensible enterprise: implementing preventive and detective controls, designing a “secure by default” SAP landscape, establishing continuous monitoring, and integrating SAP security into broader enterprise resilience strategies.
Attendees will leave with a clear blueprint for strengthening their SAP environment, improving operational readiness, and putting the right safeguards in place to protect against the next breach.
In this session, you will:
Learn how attackers establish an initial foothold in breach scenarios and specifically, common SAP‑related weaknesses exploited during intrusions, looking at techniques and privilege escalation.
Understand techniques and escalations that progress toward data theft or business disruption.
Discover best practices for building a defensible enterprise and effectively managing a breach.

