OnDemand
The holy grail of a cyber criminal is to identify a software vulnerability and exploit it before a patch is widely deployed. These Zero Day Exploits are some of the most dangerous tools in cybercrime, where proactive customers evade the attack while the slow movers fall victim.
We’ll review the layers of the SAP technology stack and discuss approaches to reducing the risk of new vulnerabilities being exploited successfully.