Brian Tremblay, Onapsis Compliance Practice Leader, joins Security & Compliance Weekly to talk about how misconfigurations and vulnerabilities in your mission-critical applications can lead to compliance problems and the need for organizations to adopt a process of continuous compliance. As a former auditor, Brian understands the best practices leaders can use to identify, monitor and mitigate compliance risks. Watch the full podcast episode below with Security Weekly to learn more.
Interested in learning more about how Onapsis can protect your mission-critical applications? Join us at the 2020 Gartner Security & Risk Management Summit, September 14 – 17. Click here to register now!

About the Author
Brian Tremblay leads Onapsis’s Compliance Practice, drawing on over 20 years of experience in internal audit and risk management. As a former Chief Audit Executive, he brings hands-on expertise in preparing organizations for public offerings and implementing critical frameworks like SOX and GDPR. Brian’s deep knowledge of IT General Controls and regulatory compliance enables him to guide customers on mitigating risks related to their business-critical applications. His background at global companies like Raytheon and Deloitte establishes him as a trusted authority on audit-ready SAP systems and bridging the gap between security and compliance.
More about this author
Further Reading
Common Vulnerabilities in SAP Systems
Missing Authorization Checks, Information Disclosure, and Cross-Site Scripting (XSS) were the top three patched vulnerabilities in 2025. Missing Authorization Checks alone accounted for nearly one-third of all security notes, as many SAP functionalities fail to default to protected states. These flaws leave systems exposed to data theft, unauthorized modification, and service disruption, making timely application…
10 Critical Questions to Ask Your SAP Security Vendor
Selecting an SAP security partner is a high-stakes decision. Generic cybersecurity tools cannot effectively secure the business-critical applications that run the global economy. When evaluating a vendor, determine if they simply scan for known issues or if they offer a comprehensive, research-driven platform capable of stopping sophisticated threats. Use these 10 questions to cut through…
The #1 Roadblock to RISE with SAP Success: A Secure-by-Design Guide
The #1 roadblock to a successful RISE with SAP transformation is failing to address security as a core part of the project. RISE with SAP is a “Business Transformation as a Service” (BTaaS) offering, but organizations that treat it as a simple technical migration without embedding security are at high risk. Research shows 70% of…
