Cyber security risks around SAP applications are a serious business threat warns Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is advising organisations to address the cyber security threat posed by SAP applications.  This is a key theme for the SAP GRC and security specialist at InfoSecurity Europe 2015, which it is attending for the first time in a move to put business-critical SAP security on the IT security agenda.

The twentieth Infosecurity Conference and Exhibition is being held at Olympia in London from 2-4 June.  Turnkey Consulting is at Stand K67.

Turnkey Consulting has seen a significant increase in the work it carries out around securing SAP applications within the enterprise.  This observation is reinforced by a noted rise in this type of security breach.  These include a recently reported hack into the US Investigations Service (USIS), the US government’s main security clearance contractor, with investigations indicating that the breach occurred via an SAP application.

Despite the cyber security risk that SAP applications pose to organisations around the world, Turnkey believes it is not currently widely acknowledged.  One of the first companies to tackle the issue, Turnkey Consulting is a leading specialist in cyber security for SAP.

Richard Hunt, managing director at Turnkey Consulting, explains:  “Today’s collaborative business environment requires that third parties have access to an SAP enterprise system, whether that is customers checking the item they want is in stock at their local store, or suppliers requiring inventory information to ensure they will meet production deadlines.  This creates a security risk, but one that is often not recognised.  This is exacerbated by the gap that traditionally exists between SAP and IT security.”

Hunt continues: “InfoSecurity 2015 provides the opportunity to engage with the wider IT security world, with a view to enabling discussions between SAP security specialists and their IT security counterparts.  The key is to enable better communication to tackle the current barriers to effective risk management.”


Leave a Comment

You must be logged in to post a comment.