SIGN-UP NOW! SIGN-UP NOW! Click to become a VoiceAmerica Member for Free!
Voiceamerica radio logo
voiceamerica-business radio logo
Apple logo Google Play Store Kindle store
Coffee Break with Game-Changers, presented by SAP

Coffee Break with Game-Changers, presented by SAP

Wednesday at 8 AM Pacific/11 AM Eastern

August 12th 2015:Data Security Breaches Part 4: Wising-Up to Real-Life Impacts

The buzz: Spelling bee. Cybersecurity breaches in the headlines still strike fear in companies, governments and individuals worldwide. For businesses, the advent of the IoT can compromise secure access to critical infrastructures by connecting business applications with process/infrastructure applications, a traditional no-no. With today’s Advanced Persistent Threats and Zero Day Exploits, how do you protect access between 30-year-old sensors without Internet protocol support? The experts speak. Gerlinde Zibulksi, SAP: “What is cybersecurity? C Y B E R S E C U R I T Y – CRY BE SECURITY – SEC

Read more
Share Email SHARE
Download PDF DOWNLOAD PDF
Get Code GET CODE

Tune in

Wednesday at 8 AM Pacific/11 AM Eastern Time on VoiceAmerica Business Channel
LISTEN LIVE
EPISODE ON DEMAND
VIEW HOST PAGE
Questions? Comments?
Call In Live!
Toll Free: 1-866-472-5790
Intl: 001-480-398-3352

Featured Guests

Guest Image

Gerlinde Zibulski

Gerlinde Zibulski has worked in various roles for SAP since 1999. She started as an HR Consultant implementing SAP HR at customers, then moved into Technology Product Management specializing in Security. She worked 12 years in Security at SAP and leads the Security Product Management since 2009. Gerlinde is responsible for SAP’s security products in the area of identity management, authentication and Single Sign-On, Cloud Identity Management, Threat Detection, Security Vulnerability Code Scans and Secure Mobile Document Management. She has multi-cultural experience from her three-year-plus years stint as a Security Product Manager for SAP Labs, Palo Alto, and a half-year as an SAP Fellow a
Read more
Guest Image

Hillel Zafir

Hillel Zafir is the co-founder and president of HMS Technology group, a global technology company helping SMEs achieve operational excellence. Hillel is an accomplished executive with a strong record of driving strategies, initiatives, and processes that generate dynamic gains in financial performance and operational efficiencies. He is an expert in leveraging business planning and information technology to reduce costs and improve productivity. He is also a recognized leader in business automation and an astute problem solver possessing the vision and leadership to maintain businesses at the forefront of cutting-edge technology. Hillel was awarded Top 25 Information Managers status by Inf
Read more
Guest Image

Richard McCammon

Richard McCammon, CEO at Delego Software, is a foremost expert in electronic payment security and SAP integration. In 1994 Richard began working with the SAP system. In 1997, he became an independent consultant working with major corporations in Canada. In this role, Richard saw an opportunity to produce world class payment card integration software for merchants using SAP, giving way to the Delego Suite of products. Delego Software was certified as a solution by SAP in early 2000. Richard was the driving force behind Delego Software and creating solutions for Fortune 5000 companies. He has presented to the American SAP User Group (ASUG), SAPPHIRE NOW & ASUG Annual Conference and SAPInside
Read more

Share This Episode

facebook Share On Facebook
twitter Share On Twitter
Linkedin Share On LinkedIn
Share Email Share this E-mail
https://www.voiceamerica.com/show/1981/coffee-break-with-game-changers-presented-by-sap 25/10/2017 08:00 25/10/2017 09:00 Coffee Break with Game-Changers, presented by SAP https://www.voiceamerica.com/show/1981/coffee-break-with-game-changers-presented-by-sap The buzz: Spelling bee. Cybersecurity breaches in the headlines still strike fear in companies, governments and individuals worldwide. For businesses, the advent of the IoT can compromise secure access to critical infrastructures by connecting business applications with process/infrastructure applications, a traditional no-no. With today’s Advanced Persistent Threats and Zero Day Exploits, how do you protect access between 30-year-old sensors without Internet protocol support? The experts speak. Gerlinde Zibulksi, SAP: “What is cybersecurity? C Y B E R S E C U R I T Y – CRY BE SECURITY – SECRET ICY RUBY – ICE CURRY BYTES – I RUT BY SECRECY.” Hillel Zafir, HMS Technology Group: “Let’s start at the very beginning, a very good place to start. When you read you begin with ABC.” (Sound of Music). Richard McCammon, Delego: “We will bankrupt ourselves in the vain search for absolute security” (Dwight D. Eisenhower). Join us for Data Security Breaches Part 4: Wising-Up to Real-Life Impacts. VoiceAmerica | Talk Radio | Online Talk Radio studio@voiceamerica.com false DD/MM/YYYY Add to Calendar
Email Host Email the Host

Connect with VoiceAmerica

Download our mobile apps
App store Google play Blackberry store
GPlus Facebook Twitter Linkedin Social Media
Va Press pass