
EP-5 #CyberKriya Podcast - "Breaking SAP to Secure It: A Hacker's Perspective" with Holger Stumm
Keywords: Cybersecurity, SAP Security, Ethical Hacking, API Security, BTP, Cloud Security, Holger Stumm, CyberKriya, Development Skills, Security Processes
Summary:
In this episode of CyberKriya, host Gaurav Singh welcomes Holger Stumm, a seasoned expert in SAP security and cybersecurity. Holger shares his extensive journey in the field, discussing the evolution of SAP and the challenges it faces in cybersecurity. He emphasizes the importance of development skills for cybersecurity professionals and the need for collaboration between security and development teams. The conversation also touches on the significance of curiosity in identifying vulnerabilities, the changing landscape of SAP security with the rise of APIs and cloud technologies, and the necessity for organizations to embrace new technologies and processes. Holger also discusses his recent book on SAP security and offers advice for those looking to enter the field of ethical hacking.
Key Takeaways
Chapters
00:00 Introduction to Cybersecurity in ERP
02:32 Holger Stumm's Journey in SAP and Cybersecurity
10:10 The Importance of Development Skills in Cybersecurity
13:58 Navigating Security Processes and Challenges
19:56 Building a Collaborative Security Culture
23:12 The Evolving Threat Landscape for SAP
30:22 Understanding External Attack Surfaces
37:54 Building a Core Team for Business Security
39:20 Breaking into Cybersecurity: Bug Bounty Programs
40:51 The Importance of a Curious Mind in Hacking
42:12 Exploring Holger's Book on SAP Security
49:37 The Shift to API and Cloud in SAP
53:20 Training for API Hacking and BTP Security
01:01:11 Integrating Non-SAP Talent into BTP Projects
01:06:06 The Future of SAP Security in a Cloud World
Disclaimer:
The views and opinions expressed in this podcast are those of the host and guests and do not necessarily reflect the official policy or position of any organization, employer, or company they are affiliated with.
This podcast is intended for informational and educational purposes only. It does not constitute professional, legal, or cybersecurity advice. References to specific companies, products, or technologies are made solely for discussion and illustration purposes — no endorsement or criticism is implied.Listeners are encouraged to consult their own security, legal, or compliance teams before acting on any information shared in this podcast.