Onapsis Webinar

The SAP Zero-Day Wake-Up Call: What CISOs and CIOs Need to Know

ON DEMAND

In recent months, an unprecedented wave of SAP zero-day attacks exposed critical structural weaknesses in the security programs of hundreds of the world’s leading organizations—raising urgent questions about detection, response, and long-term resilience of their business-critical applications. And while this made major headlines, many business leaders are still scrambling to understand what happened, what this means for their organization, and how to be protected against future attacks.

Cybersecurity leaders from EclecticIQ, Mandiant, NightDragon, and Onapsis come together to unpack these threats—from initial discovery of in-the-wild SAP exploitation and dissection of the first-ever SAP zero-day, to coordinated disclosure, patching, and proactive defense strategies.

What you will learn?

You will gain an inside look at how advanced threat actors are targeting SAP applications, what threat intelligence reveals about ongoing exploitation campaigns, and why traditional defenses often fall short. You’ll also walk away with practical guidance on how to assess risk, accelerate remediation, and harden SAP environments against future zero-day threats.

Whether you’re a CISO, CIO, or business leader, this session will equip you with the insights and actions needed to protect your organization’s most critical systems.

Cybersecurity Threats and Challenges to SAP Systems 2025

The Rising Tide of SAP Attacks

According to a recent survey of the SAPinsider community, the number of cyberattacks on SAP systems continues to rise, with a significant 92% of respondents reporting an attack in the past year. This underscores a crucial point: as SAP applications become more central to business operations, they are also becoming a top target for threat actors. Onapsis SAP Security research shows that over 23% of the data held in these systems is considered mission-critical, making the potential impact of a breach devastating.

Evolving Threats and Shifting Priorities

While traditional concerns like unpatched systems remain a challenge, the nature of these attacks is changing. This year’s survey reveals that organizations are most concerned about data exfiltration and attacks exploiting external connections. This marks a critical shift, as it highlights a move beyond simple system compromise to a focus on data theft. Other top threats include credential compromise, ransomware, and weak access controls.

The biggest challenges security teams face are keeping up with SAP updates, a lack of visibility, and ensuring proper segregation of duties. This indicates a growing gap between the speed of threats and the ability of internal teams to manage them effectively.

A Smarter Security Strategy

To combat these evolving threats, organizations are rethinking their security strategies and making targeted investments. The top drivers for a new cybersecurity approach are the need to protect sensitive data, pressure to defend against ransomware, and the imperative to keep critical systems online. This is reflected in where companies are investing, with the highest priorities being native SAP security tools, audit and monitoring, and vulnerability management.

How to Take Action

The survey points to three key recommendations for any organization looking to strengthen its SAP security posture:

  • Gain Executive Support: Secure buy-in from leadership to ensure cybersecurity is a top priority, not just an IT task.
  • Prioritize Data Protection: Focus on protecting the sensitive and confidential data within SAP systems, which is the ultimate goal of most modern cyberattacks.
  • Define a Patching Plan: Create a clear, actionable plan to address patch backlogs and ensure systems are regularly updated to reduce a major security vulnerability.

For a comprehensive approach to managing these risks and building cyber-resilience, organizations can leverage the Onapsis Platform, which is purpose-built to help secure business-critical applications and is backed by our world-renowned threat intelligence.

Onapsis Webinar

Cybersecurity Threats and Challenges to SAP Systems 2025

ON DEMAND

Over 92% of organizations identify the data in their SAP systems as mission-critical or highly important. Yet, the cybersecurity landscape is more challenging than ever. Onapsis, in collaboration with SAPinsider, presents the findings of their latest research report, Cybersecurity Threats and Challenges to SAP Systems.

In this on-demand webinar, you’ll gain crucial insights into the evolving threat landscape, including why data exfiltration has become the number one concern for SAP systems. We’ll also cover the number one challenge organizations face: keeping up with security notes and patches.

In this webinar, you’ll learn:

  • The top cybersecurity threats to SAP systems in 2025, and how they’ve shifted.
  • Key drivers behind your cybersecurity strategy, from protecting sensitive data to keeping systems online.
  • The biggest challenges organizations face in securing SAP systems, and how to overcome them.
  • The cybersecurity investments and actions leading professionals are prioritizing.
  • Actionable strategies to mature your defenses and take control of your SAP landscape’s security today.

Watch now to gain crucial insights and actionable strategies for a more secure SAP environment.

Onapsis Webinar

Cybersecurity for SAP – Rethinking Risk, Readiness, and Resilience

ON DEMAND

As SAP landscapes shift toward hybrid and cloud-native architectures, protecting your organization’s critical systems now requires a broader, enterprise-wide cybersecurity mindset. This webcast—rooted in the insights of the SAP Press book Cybersecurity for SAP—is designed for SAP professionals across roles, including Enterprise Architects, Basis administrators, developers, and security consultants.

Together, we’ll explore how to evolve from traditional SAP security to a risk-based, proactive defense strategy. Learn how to assess real-world threat scenarios, address system-level vulnerabilities, and implement proven frameworks like NIST CSF and SAP’s Secure Operations Map. Whether you’re guiding long-term architecture decisions or supporting day-to-day operations across ECC, S/4HANA, or RISE with SAP, this session equips you with the perspective and tools to play a pivotal role in your organization’s enterprise cybersecurity strategy.

Watch the authors of “Cybersecurity for SAP”, JP Perez-Etchegoyen and Gaurav Singh, as they talk you through their book and explore how to assess real-world threat scenarios, system-level vulnerabilities, and develop tools for a more robust enterprise cybersecurity strategy.

Onapsis Podcasts

ASUG Talks Roundtable: Cybersecurity in the Cloud

As SAP customers migrate to the cloud, cybersecurity is a critical component of those transformation projects. Moving your IT ecosystem and sensitive organizational data from bare-metal, on-premises environments into the cloud requires a dedicated security approach, especially as threat actors’ efforts grow more sophisticated.

In this ASUG Talks Roundtable, we dig into how enterprises should approach cybersecurity in the cloud. ASUG Talks host, Jim Lichtenwalter, is joined by the authors of the SAP Press publication Cybersecurity for SAP:  

  • Gaurav Singh
  • Juan Perez-Etchegoyen 

Key Takeaways

  • Initial steps enterprises should take when securing their cloud migrations
  • The importance of adopting a shared responsibility security model
  • The cybersecurity benefits of RISE with SAP

Onapsis Webinar

SAP a l’heure du Cloud : Comprendre et appliquer le modèle de responsabilité partagée

Sécurisez votre environnement SAP dans le cloud

ON DEMAND

Alors que de plus en plus d’organisations adoptent RISE with SAP, il devient essentiel de comprendre le Modèle de Responsabilité Partagée afin d’assurer la sécurité et la conformité des systèmes critiques.

Ce webinar vous offre une vue claire et opérationnelle sur ce qui relève de SAP, ce qui relève de votre responsabilité, et comment éviter les erreurs courantes dans cette transition.

Au programme :

  • Les implications concrètes du Modèle de Responsabilité Partagée dans RISE with SAP
  • Les risques et failles de sécurité les plus fréquents lors de la migration
  • Comment Onapsis vous aide à sécuriser vos systèmes SAP avec une protection et une conformité en continu