Skip to content

Beyond the Application: A Cyber Security Conference by Turnkey

Calendar icon to

Proudly supported by


· Stage
Welcome to the forum: Why SAP security needs to go beyond the application
In the first session of the day, Turnkey’s Tom Venables will introduce you to the conference and discuss why SAP security needs to go beyond the application.
Tom Venables
2021-07-01T09:00:00Z 2021-07-01T09:45:00Z Europe/London Welcome+to+the+forum%3A+Why+SAP+security+needs+to+go+beyond+the+application Hosted virtually on Hopin (link in the description)
· Stage
Privileged Access Management: SAP - why it's not just the front door you need to protect
Based on a recent Turnkey & CyberArk survey, David will explore why you need to extend PAM across every layer of your SAP estate (and how you can get started).
David Higgins
2021-07-01T10:00:00Z 2021-07-01T10:45:00Z Europe/London Privileged+Access+Management%3A+SAP+-+why+it%27s+not+just+the+front+door+you+need+to+protect Hosted virtually on Hopin (link in the description)
· Stage
Panel webinar: How to justify your cyber security budget
In this panel session, leading security experts from Howdens and BP will share their tips for ensuring your cyber security budget gets the green light.
Paul Edney Punit Bafna Simon Persin
2021-07-01T11:00:00Z 2021-07-01T11:45:00Z Europe/London Panel+webinar%3A+How+to+justify+your+cyber+security+budget Hosted virtually on Hopin (link in the description)
· Stage
Lunch and learn: Partner showcase
If you’d like to learn more about some of our partners, join our partner showcase sessions for exclusive product demonstrations.
2021-07-01T12:00:00Z 2021-07-01T12:45:00Z Europe/London Lunch+and+learn%3A+Partner+showcase Hosted virtually on Hopin (link in the description)
· Stage
SAP Security: What is the outside threat and how can you stop it?
Onapsis research has uncovered several SAP-specific exploitations. This session will teach you how to spot them and stop the threat before any damage is done.
Jonathan Cooper
2021-07-01T13:00:00Z 2021-07-01T13:45:00Z Europe/London SAP+Security%3A+What+is+the+outside+threat+and+how+can+you+stop+it%3F Hosted virtually on Hopin (link in the description)
· Stage
Integrating SAP ETD with your cyber security strategy
In this session, Vincent Doux from SAP will explore how you can integrate SAP enterprise threat detection with your wider cyber security strategy.
Vincent Doux
2021-07-01T14:00:00Z 2021-07-01T14:45:00Z Europe/London Integrating+SAP+ETD+with+your+cyber+security+strategy Hosted virtually on Hopin (link in the description)
· Stage
Pentesting: Ensuring you're protected
In this session, we’ll be joined by Sandeep Sharma to explore how pentesting can help you detect vulnerabilities and protect your organisation
Sandeep Sharma
2021-07-01T15:00:00Z 2021-07-01T15:45:00Z Europe/London Pentesting%3A+Ensuring+you%27re+protected Hosted virtually on Hopin (link in the description)
· Stage
Panel webinar: PICNIC, is the problem in the chair or the computer?
We’ll be joined by leading cyber security experts to discuss the “human layer” of cyber security, and why it should be part of every SAP customer’s strategy.
Alex Gambill Matthew Smith Richard Hunt
2021-07-01T16:00:00Z 2021-07-01T16:45:00Z Europe/London Panel+webinar%3A+PICNIC%2C+is+the+problem+in+the+chair+or+the+computer%3F Hosted virtually on Hopin (link in the description)


Jonathan Cooper

SAP Security Expert | Onapsis

David Higgins

EMEA Technical Director | CyberArk

Punit Bafna

Information Security Engineering Principal | BP

Paul Edney

Head of Information Security | Howdens

Matthew Smith

Group Head of Cyber Security | St. James's Place Wealth Management

Sandeep Sharma

Director of Cyber Security | Mazars

Vincent Doux

SAP COE for GRC, Cyber Security & Data Protection | SAP

Alex Gambill

Director of Product for Access Risk Management | SailPoint Technologies

Richard Hunt

Managing Director | Turnkey

Tom Venables

Practice Director - Cyber & Application Security | Turnkey

Simon Persin

Director of Operations | Turnkey

Ticket icon


Already registered? Log In to access the event

Hosted by


The world's risk, identity and security specialists

Share on