Listen to the Head of SAP at Sanofi, Frederic Maille, discuss his journey to secure SAP, including how he aligned internal teams, utilized Onapsis to determine the company’s level of risk and took actions to implement a cybersecurity program for this business-critical application. “We are an SAP shop because we have SAP everywhere,” says Maille, “…from the CRM [to the] ERP.” “Onapsis helped me to go fast… when we started to identify that we have to secure our SAP system, we really didn’t know how to start…the first idea was to start to set up a detection part.” Listen to how the Onapsis acquisition of Virtual Forge also enabled Sanofi, a customer of theirs, to improve their ERP cybersecurity and compliance strategy.
About the Author
Virginia Satrom Peterson is a strategic leader in the cybersecurity space, specializing in the intersection of business-critical application security and digital transformation. At Onapsis, she focuses on translating complex SAP threat intelligence into actionable insights for enterprise leaders. By bridging the gap between technical security operations and business stakeholders, Virginia helps organizations understand the urgency of protecting their core ERP landscapes from evolving cyber threats.
More about this author
Further Reading
How to Execute an SAP Incident Response Strategy: The Step-by-Step Playbook
Most Security Operations Centers (SOCs) operate with a dangerous blind spot. While they have mature playbooks for isolating infected endpoints or blocking malicious IPs at the firewall, they often lack a specific protocol for the organization’s most critical asset: the ERP system. This gap is existential. You cannot simply “pull the plug” on a production…
The Dangers of AI in Custom Code: How to Secure Your SAP Landscape
The evolution of AI has revolutionized the velocity of modern software development bringing unprecedented efficiencies. But at the same time, it introduces new security and compliance risks to your custom code that can be catastrophic if left unaddressed. The era of slow, manual code review is over. To survive the sheer volume of AI-generated content,…
How to Build an SAP Threat Intelligence Program in 2026
Traditional perimeter-based defenses were designed for a different era. In today’s landscape, threat actors weaponize vulnerabilities within a critical 72-hour exploit window following disclosure. This speed means that relying solely on monthly patching cycles leaves business-critical applications exposed to attack long before fixes can be implemented. To secure the digital core in 2026, organizations must…
