BigDebIT Vulnerabilities in Oracle EBS - Impact & Remediation Deep Dive

Duration: 45 minutes
Available On Demand

This session will cover the recent Onapsis Threat Report highlighting a serious example of what a potential attack on Oracle General Ledger would mean to an organization’s financials—presenting a deficiency in IT general controls for Sarbanes-Oxley (SOX) compliance for publicly-traded companies.  

SAP Transport Security: Transformation with Less Risk and More Efficiency

Duration: 35 minutes
Available On Demand

Live Date: April 9, 2020

Learn how to reduce the risk introduced through ongoing changes in your Software Development Life Cycle. We’ll look at the common types of changes happening in your SAP landscape and how those might introduce security vulnerabilities that can roadblock productivity.

SAP Security: 5 Challenges of the CIO

Duration: 38 minutes
Available On Demand

Live Date: April 29, 2020

Managing Up Means Understanding The Role of Your CIO. A strong company needs a developed IT strategy to remain connected and competitive. The complexity of these IT projects, including digital transformation, is higher than ever.

How to protect your SAP landscape against hackers

Duration: 39 minutes
Available On Demand

Live Date: April 17, 2020

See how an attacker can infiltrate your SAP system by abusing well-known misconfigurations, Understand the most common attack vectors towards your SAP landscape, Learn how you can protect yourself by using SAP security automation and alerting.

SAP ABAP Code Quality Benchmark

SAP ABAP Code Quality Benchmark

SAP code, mostly written in the ABAP programming language, is an integral part of securing SAP systems. Complexities in the system make it difficult to ensure the code meets requirements. This e-book highlights just how common code issues are and their negative impact on security, compliance, performance and stability. 

Download the e-book to review key findings from Onapsis research, including how many lines of custom code an average SAP system has and how many of those may contain critical security and compliance issues!