Brian Tremblay, Onapsis Compliance Practice Leader, joins Security & Compliance Weekly to talk about how misconfigurations and vulnerabilities in your mission-critical applications can lead to compliance problems and the need for organizations to adopt a process of continuous compliance. As a former auditor, Brian understands the best practices leaders can use to identify, monitor and mitigate compliance risks. Watch the full podcast episode below with Security Weekly to learn more.
Interested in learning more about how Onapsis can protect your mission-critical applications? Join us at the 2020 Gartner Security & Risk Management Summit, September 14 – 17. Click here to register now!

About the Author
Brian Tremblay leads Onapsis’s Compliance Practice, drawing on over 20 years of experience in internal audit and risk management. As a former Chief Audit Executive, he brings hands-on expertise in preparing organizations for public offerings and implementing critical frameworks like SOX and GDPR. Brian’s deep knowledge of IT General Controls and regulatory compliance enables him to guide customers on mitigating risks related to their business-critical applications. His background at global companies like Raytheon and Deloitte establishes him as a trusted authority on audit-ready SAP systems and bridging the gap between security and compliance.
More about this author
Further Reading
What Is SAP Security? A Definitive Guide for 2025
SAP security is the comprehensive practice of protecting SAP applications, data, and the business processes they support from unauthorized access and cyber threats. Because SAP systems house an organization’s most business-critical information, including financial, customer, and HR data, ensuring that they’re properly secured is of the utmost importance. A strong SAP application security strategy is…
SAP Security Notes: December 2025 Patch Day
SAP Patch Day for December 2025 addresses several critical vulnerabilities across different SAP Applications
Embedded SAP Security vs. Independent Platforms: A Risk-Based Guide
When securing SAP, a debate often arises: is it better to use an “embedded” tool that runs inside SAP or an “independent” platform that runs outside of it? While embedded tools seem convenient, they present significant risks. A truly resilient and effective SAP security strategy requires an independent, external platform. This approach provides superior resilience…
