The global and independent platform for the SAP community.

Author: Raimund Genes, Trend Micro

Raimund Genes was CTO at Trend Micro.
When it comes to IT attacks, the first question on outsiders' minds is who is to blame. People want to assign an attack to a perpetrator, at least in their minds.
Looking back over the past year, one term comes to the forefront in the security environment: crypto-ransomware.
Do you know this too? You stumble upon a topic, think it's science fiction - and one day realize that the future has long since become reality...
Do you know this too? You stumble upon a topic, think it's science fiction - and one day realize that the future has long since become reality...
Whether touted as the "Holy Grail," the "Egg-Laying Wooly Pig" or the "Silver Bullet: Every year, new technologies are presented at IT security trade fairs that supposedly solve all security problems better and more cost-effectively than anything before.
Hardly any security technology has accompanied us as long as the password. Over the decades, there have always been optimizations, but the basic principle has remained the same.
Of course, the hype topic "Big Data" does not stop at IT security. Insiders are also surprised at the number of start-ups that have appeared on the market in the past three years with solutions for "Big Data-based Threat Detection".
Do you know this too? Your predictions come true and you still can't be happy? In this specific case, it's about smart TVs.
With the summer, the summer flu season is also just around the corner and with it the vaccination discussion. We are also seeing a similar development in the IT sector.
Two security vulnerabilities in Apple's QuickTime for Windows were published in mid-April. They were discovered already at the end of 2015, but because they were not announced, Apple had time to react. What was called "announce" here has consequences...
They have dominated the headlines in recent weeks: Attacks with malware actually forced hospitals in Germany to partially shut down operations in some departments. So far, so bad. But what really happened?
When we think of the Internet of Things, many people think of hip objects such as smartwatches, fitness trackers or cars with WLAN. Basically, however, it can mean any device with which you can communicate electronically. This also includes weapons.

Working on the SAP basis is crucial for successful S/4 conversion. 

This gives the Competence Center strategic importance for existing SAP customers. Regardless of the S/4 Hana operating model, topics such as Automation, Monitoring, Security, Application Lifecycle Management and Data Management the basis for S/4 operations.

For the second time, E3 magazine is organizing a summit for the SAP community in Salzburg to provide comprehensive information on all aspects of S/4 Hana groundwork.

Venue

More information will follow shortly.

Event date

Wednesday, May 21, and
Thursday, May 22, 2025

Early Bird Ticket

Available until Friday, January 24, 2025
EUR 390 excl. VAT

Regular ticket

EUR 590 excl. VAT

Venue

Hotel Hilton Heidelberg
Kurfürstenanlage 1
D-69115 Heidelberg

Event date

Wednesday, March 5, and
Thursday, March 6, 2025

Tickets

Regular ticket
EUR 590 excl. VAT
Early Bird Ticket

Available until December 24, 2024

EUR 390 excl. VAT
The event is organized by the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes attendance at all presentations of the Steampunk and BTP Summit 2025, a visit to the exhibition area, participation in the evening event and catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due course.