Attacks on Crown Jewels: SAP Vulnerabilities and Exploits
Star 0
Share
Abstract
Join us to learn which are the most critical SAP security vulnerabilities, public exploits and defense strategies. Learn through live attack demos, opensource tools and war stories how to check…