Onapsis Director of Product Management, Alex Horan, had the pleasure of speaking with Security Guy TV host, Chuck Harold, at Black Hat Las Vegas 2019 earlier this month. Alex and Chuck were able to discuss the unique offerings Onapsis can provide your organization, such as continuous monitoring and change assurance. “[People] have a lot to do,” Alex commented, “they have a lot of things running in their environments and understanding them all and knowing exactly what to do for all of them is a hard task.” This is a problem people have “lived with” for so long that they have become immune to it because these systems have been enabled for a long time. People assume they have not had a security issue, which is different from a technical issue, and therefore will never have one. Watch the interview below for the full story!
About the Author
Alex Horan is the Vice President of Product Management for Onapsis, where he focuses on developing solutions for SAP security and ERP vulnerability management. With over 18 years of experience, Alex has a proven track record of helping large companies enhance their security posture. His expertise spans key areas such as vulnerability assessment, penetration testing, and systems auditing, making him a trusted voice on topics like SAP compliance and secure system configuration. He is committed to ensuring that Onapsis’s products provide advanced protection against real-world threats like ransomware and unauthorized access.
More about this author
Further Reading
The 2,000-Hour Drain: Why Manual SAP ITGC Audits Are Costing You More Than Just Time
Manual SAP ITGC (IT General Controls) audits require extensive resource hours to satisfy regulatory requirements and internal stakeholders. While many organizations believe manual verification ensures compliance accuracy, relying on human effort to test sprawling SAP landscapes introduces significant operational costs and critical security risks. The Resource Drain: Where Do the Hours Go? Manual SAP ITGC…
Beyond the Basics: Why Comprehensive Application Security Testing for SAP is Non-Negotiable
The shift to the cloud and the rapid evolution of SAP S/4HANA have fundamentally changed the rules of secure software development. Many organizations assume that operating within the SAP ecosystem means built-in tools and the provider’s infrastructure will fully manage their security and compliance requirements. However, relying solely on baseline code security leaves critical vulnerabilities…
The NIST Cybersecurity Framework: What It Is and How to Apply It to SAP
The NIST Cybersecurity Framework provides a comprehensive methodology for organizations to manage cyber risk. Implementing the NIST framework within SAP systems secures the financial, operational, and human resources data that drives the global enterprise. Data breaches cost an average of $4.44 million globally, making robust SAP Governance, Risk, and Compliance strategies essential for modern businesses….


