The global and independent platform for the SAP community.

Author: Raimund Genes, Trend Micro

Raimund Genes was CTO at Trend Micro.
When it comes to IT attacks, the first question on outsiders' minds is who is to blame. People want to assign an attack to a perpetrator, at least in their minds.
Looking back over the past year, one term comes to the forefront in the security environment: crypto-ransomware.
Do you know this too? You stumble upon a topic, think it's science fiction - and one day realize that the future has long since become reality...
Do you know this too? You stumble upon a topic, think it's science fiction - and one day realize that the future has long since become reality...
Whether touted as the "Holy Grail," the "Egg-Laying Wooly Pig" or the "Silver Bullet: Every year, new technologies are presented at IT security trade fairs that supposedly solve all security problems better and more cost-effectively than anything before.
Hardly any security technology has accompanied us as long as the password. Over the decades, there have always been optimizations, but the basic principle has remained the same.
Of course, the hype topic "Big Data" does not stop at IT security. Insiders are also surprised at the number of start-ups that have appeared on the market in the past three years with solutions for "Big Data-based Threat Detection".
Do you know this too? Your predictions come true and you still can't be happy? In this specific case, it's about smart TVs.
With the summer, the summer flu season is also just around the corner and with it the vaccination discussion. We are also seeing a similar development in the IT sector.
Two security vulnerabilities in Apple's QuickTime for Windows were published in mid-April. They were discovered already at the end of 2015, but because they were not announced, Apple had time to react. What was called "announce" here has consequences...
They have dominated the headlines in recent weeks: Attacks with malware actually forced hospitals in Germany to partially shut down operations in some departments. So far, so bad. But what really happened?
When we think of the Internet of Things, many people think of hip objects such as smartwatches, fitness trackers or cars with WLAN. Basically, however, it can mean any device with which you can communicate electronically. This also includes weapons.

Working on the SAP basis is crucial for successful S/4 conversion. 

This gives the Competence Center strategic importance for existing SAP customers. Regardless of the S/4 Hana operating model, topics such as Automation, Monitoring, Security, Application Lifecycle Management and Data Management the basis for S/4 operations.

For the second time, E3 magazine is organizing a summit for the SAP community in Salzburg to provide comprehensive information on all aspects of S/4 Hana groundwork. All information about the event can be found here:

SAP Competence Center Summit 2024

Venue

Event Room, FourSide Hotel Salzburg,
At the exhibition center 2,
A-5020 Salzburg

Event date

June 5 and 6, 2024

Regular ticket:

€ 590 excl. VAT

Venue

Event Room, Hotel Hilton Heidelberg,
Kurfürstenanlage 1,
69115 Heidelberg

Event date

28 and 29 February 2024

Tickets

Regular ticket
EUR 590 excl. VAT
The organizer is the E3 magazine of the publishing house B4Bmedia.net AG. The presentations will be accompanied by an exhibition of selected SAP partners. The ticket price includes the attendance of all lectures of the Steampunk and BTP Summit 2024, the visit of the exhibition area, the participation in the evening event as well as the catering during the official program. The lecture program and the list of exhibitors and sponsors (SAP partners) will be published on this website in due time.