Artificial Intelligence (AI)

Protecting SAP in a World of AI, Cloud, and Constant Threats. Built for SAP security leaders, CISOs, risk managers, and IT teams protecting mission-critical SAP environments.

What You'll Learn

How to proactively manage cyber risk across SAP landscapes

How AI, automation, and Zero Trust strengthen identity, access, and threat detection

How to design resilient SAP environments across cloud, hybrid, and third-party integrations

Must-Attend Sessions

Customer Case Study

Turning Vulnerabilities to Value in SAP Security Strategy
Wed, March 18
,
10:40 AM
-
11:20 AM

Cybersecurity is no longer just an IT concern — it’s a business imperative. In a world of increasing regulatory pressure, AI-powered threats, and complex digital ecosystems, SAP environments remain high-value targets for cyberattacks. Yet many organisations still struggle to translate technical risks — such as unpatched vulnerabilities, excessive user access, and insecure integrations — into board-level conversations that drive action. Learn how to reframe SAP security from reactive protection to proactive value creation. Explore how to quantify risk in business terms, align with executive priorities, and build security strategies that support trust, compliance, and business continuity. With real-world insights from global operations and transformation programs, you'll leave with a practical framework for elevating cybersecurity to a strategic conversation. You will learn how to: Speak the language of the business: Learn how to communicate SAP cyber risks to senior executives with impact — linking technical threats to financial, reputational, and operational outcomes. Prioritize what matters most: Discover how to assess and rank SAP vulnerabilities using likelihood and business impact — helping teams focus on what really drives risk reduction. Stay ahead of emerging risks — from AI-enabled threats to data sovereignty and new compliance pressures.

Cybersecurity

Cybersecurity

All Sessions

Wednesday
,︀
March 18

Customer Case Study

Turning Vulnerabilities to Value in SAP Security Strategy
Wed, March 18
,
10:40 AM
-
11:20 AM

Cybersecurity is no longer just an IT concern — it’s a business imperative. In a world of increasing regulatory pressure, AI-powered threats, and complex digital ecosystems, SAP environments remain high-value targets for cyberattacks. Yet many organisations still struggle to translate technical risks — such as unpatched vulnerabilities, excessive user access, and insecure integrations — into board-level conversations that drive action. Learn how to reframe SAP security from reactive protection to proactive value creation. Explore how to quantify risk in business terms, align with executive priorities, and build security strategies that support trust, compliance, and business continuity. With real-world insights from global operations and transformation programs, you'll leave with a practical framework for elevating cybersecurity to a strategic conversation. You will learn how to: Speak the language of the business: Learn how to communicate SAP cyber risks to senior executives with impact — linking technical threats to financial, reputational, and operational outcomes. Prioritize what matters most: Discover how to assess and rank SAP vulnerabilities using likelihood and business impact — helping teams focus on what really drives risk reduction. Stay ahead of emerging risks — from AI-enabled threats to data sovereignty and new compliance pressures.

Cybersecurity

Cybersecurity

All Sessions

Wednesday
,︀
March 18

Customer Case Study

Turning Vulnerabilities to Value in SAP Security Strategy
Wed, March 18
,
10:40 AM
-
11:20 AM

Cybersecurity is no longer just an IT concern — it’s a business imperative. In a world of increasing regulatory pressure, AI-powered threats, and complex digital ecosystems, SAP environments remain high-value targets for cyberattacks. Yet many organisations still struggle to translate technical risks — such as unpatched vulnerabilities, excessive user access, and insecure integrations — into board-level conversations that drive action. Learn how to reframe SAP security from reactive protection to proactive value creation. Explore how to quantify risk in business terms, align with executive priorities, and build security strategies that support trust, compliance, and business continuity. With real-world insights from global operations and transformation programs, you'll leave with a practical framework for elevating cybersecurity to a strategic conversation. You will learn how to: Speak the language of the business: Learn how to communicate SAP cyber risks to senior executives with impact — linking technical threats to financial, reputational, and operational outcomes. Prioritize what matters most: Discover how to assess and rank SAP vulnerabilities using likelihood and business impact — helping teams focus on what really drives risk reduction. Stay ahead of emerging risks — from AI-enabled threats to data sovereignty and new compliance pressures.

Cybersecurity

Cybersecurity

All Sessions

Wednesday
,︀
March 18

Breakout Session

What's on Your Mind? The Real-World Impact of a Security Breach
Wed, March 18
,
11:40 AM
-
12:20 PM

This dynamic discussion session examines recent high-profile cybersecurity breaches to highlight how threats evolve, how attackers exploit vulnerabilities, and how impacts extend far beyond the breached organization. Attendees will learn how disruptions to systems, sensitive data exposure, and compromised third-party relationships can trigger financial losses, regulatory scrutiny, reputational damage, and supply chain instability. The session will also explore broader economic implications, including market volatility and increased operational costs for organizations that were not directly breached. Join this session for an interactive discussion on: Strengthening security posture. Improving vendor risk management. Building resilience to mitigate far-reaching effects of modern cyberattacks.

Cybersecurity

Cybersecurity

All Sessions

Wednesday
,︀
March 18

Breakout Session

What's on Your Mind? The Real-World Impact of a Security Breach
Wed, March 18
,
11:40 AM
-
12:20 PM

This dynamic discussion session examines recent high-profile cybersecurity breaches to highlight how threats evolve, how attackers exploit vulnerabilities, and how impacts extend far beyond the breached organization. Attendees will learn how disruptions to systems, sensitive data exposure, and compromised third-party relationships can trigger financial losses, regulatory scrutiny, reputational damage, and supply chain instability. The session will also explore broader economic implications, including market volatility and increased operational costs for organizations that were not directly breached. Join this session for an interactive discussion on: Strengthening security posture. Improving vendor risk management. Building resilience to mitigate far-reaching effects of modern cyberattacks.

Cybersecurity

Cybersecurity

All Sessions

Wednesday
,︀
March 18

Breakout Session

What's on Your Mind? The Real-World Impact of a Security Breach
Wed, March 18
,
11:40 AM
-
12:20 PM

This dynamic discussion session examines recent high-profile cybersecurity breaches to highlight how threats evolve, how attackers exploit vulnerabilities, and how impacts extend far beyond the breached organization. Attendees will learn how disruptions to systems, sensitive data exposure, and compromised third-party relationships can trigger financial losses, regulatory scrutiny, reputational damage, and supply chain instability. The session will also explore broader economic implications, including market volatility and increased operational costs for organizations that were not directly breached. Join this session for an interactive discussion on: Strengthening security posture. Improving vendor risk management. Building resilience to mitigate far-reaching effects of modern cyberattacks.

Cybersecurity

Cybersecurity

All Sessions

Wednesday
,︀
March 18

Breakout Session

Securing AI and Agentic AI in Fast-Moving Business and Technology Transformation
Thu, March 19
,
11:30 AM
-
12:10 PM

AI and Agentic AI promise significant benefits, however, they bring security risks such as breaches of privacy and confidentiality, unauthorized access and action. The unpredictability of Generative AI also poses new risks. We must ensure chat bots, co-pilots and agents stay within their intended scope boundaries and authorizations. Agents that interact with business systems and especially those that can act on users' behalf need to be carefully controlled and these risks multiply when agents start collaborating together.   This session gives an overview of the security risks for AI workloads across the stack, from agent and application, down to the models, platforms, and infrastructure. This established cybersecurity practice helps to identify security risks so they can be addressed early. Join this session to learn techniques, tools, and services that SAP uses itself to secure AI workloads and minimize risk without inhibiting pace of innovation. You will learn: Full-stack security risks for AI workloads (SAP or otherwise).  Core principles of AI and Agentic AI threat modeling and risk identification.  Techniques, tools and services that can help reduce security risks.

Artificial Intelligence (AI), Cybersecurity

Artificial Intelligence (AI)

Cybersecurity

All Sessions

Thursday
,︀
March 19

Breakout Session

Securing AI and Agentic AI in Fast-Moving Business and Technology Transformation
Thu, March 19
,
11:30 AM
-
12:10 PM

AI and Agentic AI promise significant benefits, however, they bring security risks such as breaches of privacy and confidentiality, unauthorized access and action. The unpredictability of Generative AI also poses new risks. We must ensure chat bots, co-pilots and agents stay within their intended scope boundaries and authorizations. Agents that interact with business systems and especially those that can act on users' behalf need to be carefully controlled and these risks multiply when agents start collaborating together.   This session gives an overview of the security risks for AI workloads across the stack, from agent and application, down to the models, platforms, and infrastructure. This established cybersecurity practice helps to identify security risks so they can be addressed early. Join this session to learn techniques, tools, and services that SAP uses itself to secure AI workloads and minimize risk without inhibiting pace of innovation. You will learn: Full-stack security risks for AI workloads (SAP or otherwise).  Core principles of AI and Agentic AI threat modeling and risk identification.  Techniques, tools and services that can help reduce security risks.

Artificial Intelligence (AI), Cybersecurity

Artificial Intelligence (AI)

Cybersecurity

All Sessions

Thursday
,︀
March 19

Breakout Session

Securing AI and Agentic AI in Fast-Moving Business and Technology Transformation
Thu, March 19
,
11:30 AM
-
12:10 PM

AI and Agentic AI promise significant benefits, however, they bring security risks such as breaches of privacy and confidentiality, unauthorized access and action. The unpredictability of Generative AI also poses new risks. We must ensure chat bots, co-pilots and agents stay within their intended scope boundaries and authorizations. Agents that interact with business systems and especially those that can act on users' behalf need to be carefully controlled and these risks multiply when agents start collaborating together.   This session gives an overview of the security risks for AI workloads across the stack, from agent and application, down to the models, platforms, and infrastructure. This established cybersecurity practice helps to identify security risks so they can be addressed early. Join this session to learn techniques, tools, and services that SAP uses itself to secure AI workloads and minimize risk without inhibiting pace of innovation. You will learn: Full-stack security risks for AI workloads (SAP or otherwise).  Core principles of AI and Agentic AI threat modeling and risk identification.  Techniques, tools and services that can help reduce security risks.

Artificial Intelligence (AI), Cybersecurity

Artificial Intelligence (AI)

Cybersecurity

All Sessions

Thursday
,︀
March 19

Customer Case Study

AI-Powered Cyber Resilience Strategies for SAP S/4HANA Cloud with Merck
Wed, March 18
,
2:30 PM
-
3:10 PM

Hear how Merck, a global leader in healthcare, science, and technology, has developed a cyber resilience strategy for their SAP S/4HANA Cloud environment using Zero Trust principles in the S/4HANA Private Cloud. Lessons learned emphasize collaboration, proactive security, SAP and partner technologies, user engagement, and an understanding of shared responsibilities. By attending this session, attendees will leave with ideas to strengthen their security posture and address evolving cyber threats in the SAP S/4HANA environment.

Artificial Intelligence (AI), Cybersecurity, Governance Risk and Compliance (GRC)

Artificial Intelligence (AI)

Cybersecurity

Governance Risk and Compliance (GRC)

All Sessions

Wednesday
,︀
March 18

Customer Case Study

AI-Powered Cyber Resilience Strategies for SAP S/4HANA Cloud with Merck
Wed, March 18
,
2:30 PM
-
3:10 PM

Hear how Merck, a global leader in healthcare, science, and technology, has developed a cyber resilience strategy for their SAP S/4HANA Cloud environment using Zero Trust principles in the S/4HANA Private Cloud. Lessons learned emphasize collaboration, proactive security, SAP and partner technologies, user engagement, and an understanding of shared responsibilities. By attending this session, attendees will leave with ideas to strengthen their security posture and address evolving cyber threats in the SAP S/4HANA environment.

Artificial Intelligence (AI), Cybersecurity, Governance Risk and Compliance (GRC)

Artificial Intelligence (AI)

Cybersecurity

Governance Risk and Compliance (GRC)

All Sessions

Wednesday
,︀
March 18

Customer Case Study

AI-Powered Cyber Resilience Strategies for SAP S/4HANA Cloud with Merck
Wed, March 18
,
2:30 PM
-
3:10 PM

Hear how Merck, a global leader in healthcare, science, and technology, has developed a cyber resilience strategy for their SAP S/4HANA Cloud environment using Zero Trust principles in the S/4HANA Private Cloud. Lessons learned emphasize collaboration, proactive security, SAP and partner technologies, user engagement, and an understanding of shared responsibilities. By attending this session, attendees will leave with ideas to strengthen their security posture and address evolving cyber threats in the SAP S/4HANA environment.

Artificial Intelligence (AI), Cybersecurity, Governance Risk and Compliance (GRC)

Artificial Intelligence (AI)

Cybersecurity

Governance Risk and Compliance (GRC)

All Sessions

Wednesday
,︀
March 18

Customer Case Study

SAP S/4HANA Transformations: Have You Secured Your Integrations?
Tue, March 17
,
3:00 PM
-
3:40 PM

As SAP customers embark on or plan for an SAP S/4HANA transformation, SAP security professionals must prepare for this new frontier. With the Clean Core approach, the SAP landscape is shifting toward an API-first model where SAP BTP, specifically SAP Integration Suite, is central. For organizations coming from the SAP PI/PO world, this this is a new environment with its own limitations and challenges. As SAP Integration Suite becomes the hub for both SAP-to-SAP and SAP-to-non-SAP integrations, the granular RBAC controls familiar from the ABAP/Java world are no longer available in the same way.   Join this session to: Gain clarity on how SAP Integration Suite reshapes integrations with a Clean Core. Learn about process and architecture considerations to secure and govern SAP Integration Suite. Walk away with guidance on tenant strategy, CPI security, API security, policy and identity and access management.

Cybersecurity, Integration, Platform and Systems Management

Cybersecurity

Integration

Platform and Systems Management

All Sessions

Tuesday
,︀
March 17

Customer Case Study

SAP S/4HANA Transformations: Have You Secured Your Integrations?
Tue, March 17
,
3:00 PM
-
3:40 PM

As SAP customers embark on or plan for an SAP S/4HANA transformation, SAP security professionals must prepare for this new frontier. With the Clean Core approach, the SAP landscape is shifting toward an API-first model where SAP BTP, specifically SAP Integration Suite, is central. For organizations coming from the SAP PI/PO world, this this is a new environment with its own limitations and challenges. As SAP Integration Suite becomes the hub for both SAP-to-SAP and SAP-to-non-SAP integrations, the granular RBAC controls familiar from the ABAP/Java world are no longer available in the same way.   Join this session to: Gain clarity on how SAP Integration Suite reshapes integrations with a Clean Core. Learn about process and architecture considerations to secure and govern SAP Integration Suite. Walk away with guidance on tenant strategy, CPI security, API security, policy and identity and access management.

Cybersecurity, Integration, Platform and Systems Management

Cybersecurity

Integration

Platform and Systems Management

All Sessions

Tuesday
,︀
March 17

Customer Case Study

SAP S/4HANA Transformations: Have You Secured Your Integrations?
Tue, March 17
,
3:00 PM
-
3:40 PM

As SAP customers embark on or plan for an SAP S/4HANA transformation, SAP security professionals must prepare for this new frontier. With the Clean Core approach, the SAP landscape is shifting toward an API-first model where SAP BTP, specifically SAP Integration Suite, is central. For organizations coming from the SAP PI/PO world, this this is a new environment with its own limitations and challenges. As SAP Integration Suite becomes the hub for both SAP-to-SAP and SAP-to-non-SAP integrations, the granular RBAC controls familiar from the ABAP/Java world are no longer available in the same way.   Join this session to: Gain clarity on how SAP Integration Suite reshapes integrations with a Clean Core. Learn about process and architecture considerations to secure and govern SAP Integration Suite. Walk away with guidance on tenant strategy, CPI security, API security, policy and identity and access management.

Cybersecurity, Integration, Platform and Systems Management

Cybersecurity

Integration

Platform and Systems Management

All Sessions

Tuesday
,︀
March 17