Members of the Research Labs frequently lecture at key security and audit conferences across the globe.

To help guide the industry with strategic foresight into matters affecting SAP cyber-security, each presentation is available for download below.

02/12/2014
techniques attackers may use to target and compromise an SAP BusinessObjects deployment and what you need to do in order to mitigate those risks
09/26/2013
In this talk, we will discuss the attack surface exposed by increased distribution ERP systems, and will conduct several live demonstrations of attacks that you will see if you run an ERP Penetration Test.
08/30/2013
In this talk we will work backwards to see the different stages and attacks that could be performed to compromise a SAP system without any prior knowledge about the target and credentials to access the same system.
05/16/2013
The presentation is based on the research contained in the latest SAP Security In-Depth publication: SAP TMS: A Highway to Production. Click Here to download the publication.
03/13/2013
This presentation will cover how to do a forensic analysis of an SAP system, looking for traces of a security breach.
03/12/2013
This presentation will highlight three attack vectors targeting SAP.
03/12/2013
Even “compliant” and “secure” Production systems can be compromised if the security of the platform has not been thought holistically.
11/30/2012
In this talk we present, through various live demonstrations, novel attack vectors that a hacker can use in intrusion attempt to SAP Solution Manager, and result in a total compromise to the SAP implementation.
10/26/2012
After a brief introduction into ERP systems such as Oracle Siebel and JD Edwards this presentation will cover attack scenarios that these systems are faced with.
05/23/2012
In this talk we present, through various live demonstrations, novel attack vectors that a hacker can use in intrusion attempt to SAP Solution Manager, and result in a total compromise to the SAP implementation.

Pages