We have about a week to go until this year’s RSA Conference in San Francisco! As you set your schedule for the week, there are many learning opportunities for you to take advantage of. We would like to invite you to stop by our speaking session on Tuesday, March 5 at 5:10 to see what our CTO, JP Perez-Etchegoyen has to share about the importance of including ERP applications, such as SAP and Oracle, in your security and compliance strategy.
Onapsis Speaking Session
Dissecting ERP Breaches: They’re More Common Than You Know
Tuesday, March 5 | 5:10 PM PT
Here’s JP to talk about the three things you’ll learn about ERP security when you attend our session next week. And don’t forget to stop by our booth, #5464, so you can meet the rest of our experts and ask your questions about how to secure these business-critical applications.
About the Author
As CTO, JP leads the innovation team that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical acclaim for the Onapsis Research Labs. JP is regularly invited to speak and host trainings at global industry conferences, including Black Hat, HackInTheBox, AppSec, Troopers, Oracle OpenWorld and SAP TechEd, and is a founding member of the Cloud Security Alliance (CSA) Cloud ERP Working Group. Over his professional career, JP has led many Information Security consultancy projects for some of the world’s biggest companies around the globe in the fields of penetration and web application testing, vulnerability research, cybersecurity infosec auditing/standards, vulnerability research and more.
More about this author
Further Reading
Meet the Ona – Elke Bastian
Meet Elke Bastian: Background & Roots Hi, my name is Elke Bastian. I live in Saarbrücken, Germany, together with my partner and my 14-year-old daughter. We are located directly on the French border and also close to Luxembourg. From a professional perspective, I am a product marketing enthusiast and enjoy collaborating with all other marketing…
Common Vulnerabilities in SAP Systems
Missing Authorization Checks, Information Disclosure, and Cross-Site Scripting (XSS) were the top three patched vulnerabilities in 2025. Missing Authorization Checks alone accounted for nearly one-third of all security notes, as many SAP functionalities fail to default to protected states. These flaws leave systems exposed to data theft, unauthorized modification, and service disruption, making timely application…
10 Critical Questions to Ask Your SAP Security Vendor
Selecting an SAP security partner is a high-stakes decision. Generic cybersecurity tools cannot effectively secure the business-critical applications that run the global economy. When evaluating a vendor, determine if they simply scan for known issues or if they offer a comprehensive, research-driven platform capable of stopping sophisticated threats. Use these 10 questions to cut through…
