RECON SAP vulnerability affects over 40,000 SAP customers
Onapsis has discovered and worked with SAP to release a patch for the RECON vulnerabilities, affecting a component included in many SAP applications.
Onapsis has discovered and worked with SAP to release a patch for the RECON vulnerabilities, affecting a component included in many SAP applications.
This session will cover the recent Onapsis Threat Report highlighting a serious example of what a potential attack on Oracle General Ledger would mean to an organization’s financials—presenting a deficiency in IT general controls for Sarbanes-Oxley (SOX) compliance for publicly-traded companies.
Oracle BigDebIT vulnerabilities put thousands of organizations at risk. Onapsis threat research has discovered this major financial and compliance risk to companies who may not have the latest patch from Oracle.
SAP code, mostly written in the ABAP programming language, is an integral part of securing SAP systems. Complexities in the system make it difficult to ensure the code meets requirements. This e-book highlights just how common code issues are and their negative impact on security, compliance, performance and stability.
Watch Mauricio Guerra, CISO at Dow Chemical, as he describes how the company assessed areas of risk in their SAP systems to optimize operational resiliency.
The Chief Information Officer (CIO) holds responsibility for all IT decisions affecting the company, a task that has increased in complexity since the early days of the internet. A strong company needs a developed IT strategy to remain connected and competitive. The complexity of these IT projects, including digital transformation, is higher than ever.
A live demo of key Onapsis capabilities will be performed to demonstrate how vulnerabilities, such as ABAP or HANA code, can be eliminated with tools such as their CodeProfiler.
See how an attacker can infiltrate your SAP system by abusing well-known misconfigurations, Understand the most common attack vectors towards your SAP landscape, Learn how you can protect yourself by using SAP security automation and alerting.
In this session, we’ll look at the common types of changes happening in your SAP landscape and how those might introduce security vulnerabilities that can roadblock productivity. We will also highlight reasons why this threat vector is a growing target for attackers.