The SAP Zero-Day Wake-Up Call: What CISOs and CIOs Need to Know
In this webinar you will join cybersecurity leaders to unpack the threats.
In this webinar you will join cybersecurity leaders to unpack the threats.
ON DEMAND
In recent months, an unprecedented wave of SAP zero-day attacks exposed critical structural weaknesses in the security programs of hundreds of the world’s leading organizations—raising urgent questions about detection, response, and long-term resilience of their business-critical applications. And while this made major headlines, many business leaders are still scrambling to understand what happened, what this means for their organization, and how to be protected against future attacks.
Cybersecurity leaders from EclecticIQ, Mandiant, NightDragon, and Onapsis come together to unpack these threats—from initial discovery of in-the-wild SAP exploitation and dissection of the first-ever SAP zero-day, to coordinated disclosure, patching, and proactive defense strategies.
You will gain an inside look at how advanced threat actors are targeting SAP applications, what threat intelligence reveals about ongoing exploitation campaigns, and why traditional defenses often fall short. You’ll also walk away with practical guidance on how to assess risk, accelerate remediation, and harden SAP environments against future zero-day threats.
Whether you’re a CISO, CIO, or business leader, this session will equip you with the insights and actions needed to protect your organization’s most critical systems.
According to a recent survey of the SAPinsider community, the number of cyberattacks on SAP systems continues to rise, with a significant 92% of respondents reporting an attack in the past year. This underscores a crucial point: as SAP applications become more central to business operations, they are also becoming a top target for threat actors. Onapsis SAP Security research shows that over 23% of the data held in these systems is considered mission-critical, making the potential impact of a breach devastating.
While traditional concerns like unpatched systems remain a challenge, the nature of these attacks is changing. This year’s survey reveals that organizations are most concerned about data exfiltration and attacks exploiting external connections. This marks a critical shift, as it highlights a move beyond simple system compromise to a focus on data theft. Other top threats include credential compromise, ransomware, and weak access controls.
The biggest challenges security teams face are keeping up with SAP updates, a lack of visibility, and ensuring proper segregation of duties. This indicates a growing gap between the speed of threats and the ability of internal teams to manage them effectively.
To combat these evolving threats, organizations are rethinking their security strategies and making targeted investments. The top drivers for a new cybersecurity approach are the need to protect sensitive data, pressure to defend against ransomware, and the imperative to keep critical systems online. This is reflected in where companies are investing, with the highest priorities being native SAP security tools, audit and monitoring, and vulnerability management.
The survey points to three key recommendations for any organization looking to strengthen its SAP security posture:
For a comprehensive approach to managing these risks and building cyber-resilience, organizations can leverage the Onapsis Platform, which is purpose-built to help secure business-critical applications and is backed by our world-renowned threat intelligence.
Uncover 2025’s top SAP cybersecurity threats, from unpatched systems to data breaches. Get expert insights & investment recommendations to secure your critical SAP landscape.
ON DEMAND
Over 92% of organizations identify the data in their SAP systems as mission-critical or highly important. Yet, the cybersecurity landscape is more challenging than ever. Onapsis, in collaboration with SAPinsider, presents the findings of their latest research report, Cybersecurity Threats and Challenges to SAP Systems.
In this on-demand webinar, you’ll gain crucial insights into the evolving threat landscape, including why data exfiltration has become the number one concern for SAP systems. We’ll also cover the number one challenge organizations face: keeping up with security notes and patches.
In this webinar, you’ll learn:
Watch now to gain crucial insights and actionable strategies for a more secure SAP environment.
Learn why data exfiltration is now the #1 SAP threat and how to overcome patching challenges. This Onapsis and SAPinsider webinar offers actionable strategies to secure your critical data.
ON DEMAND
As SAP landscapes shift toward hybrid and cloud-native architectures, protecting your organization’s critical systems now requires a broader, enterprise-wide cybersecurity mindset. This webcast—rooted in the insights of the SAP Press book Cybersecurity for SAP—is designed for SAP professionals across roles, including Enterprise Architects, Basis administrators, developers, and security consultants.
Together, we’ll explore how to evolve from traditional SAP security to a risk-based, proactive defense strategy. Learn how to assess real-world threat scenarios, address system-level vulnerabilities, and implement proven frameworks like NIST CSF and SAP’s Secure Operations Map. Whether you’re guiding long-term architecture decisions or supporting day-to-day operations across ECC, S/4HANA, or RISE with SAP, this session equips you with the perspective and tools to play a pivotal role in your organization’s enterprise cybersecurity strategy.
Watch the authors of “Cybersecurity for SAP”, JP Perez-Etchegoyen and Gaurav Singh, as they talk you through their book and explore how to assess real-world threat scenarios, system-level vulnerabilities, and develop tools for a more robust enterprise cybersecurity strategy.
As SAP customers migrate to the cloud, cybersecurity is a critical component of those transformation projects. Moving your IT ecosystem and sensitive organizational data from bare-metal, on-premises environments into the cloud requires a dedicated security approach, especially as threat actors’ efforts grow more sophisticated.
In this ASUG Talks Roundtable, we dig into how enterprises should approach cybersecurity in the cloud. ASUG Talks host, Jim Lichtenwalter, is joined by the authors of the SAP Press publication Cybersecurity for SAP:
Key Takeaways
ON DEMAND
Alors que de plus en plus d’organisations adoptent RISE with SAP, il devient essentiel de comprendre le Modèle de Responsabilité Partagée afin d’assurer la sécurité et la conformité des systèmes critiques.
Ce webinar vous offre une vue claire et opérationnelle sur ce qui relève de SAP, ce qui relève de votre responsabilité, et comment éviter les erreurs courantes dans cette transition.