We have about a week to go until this year’s RSA Conference in San Francisco! As you set your schedule for the week, there are many learning opportunities for you to take advantage of. We would like to invite you to stop by our speaking session on Tuesday, March 5 at 5:10 to see what our CTO, JP Perez-Etchegoyen has to share about the importance of including ERP applications, such as SAP and Oracle, in your security and compliance strategy.
Onapsis Speaking Session
Dissecting ERP Breaches: They’re More Common Than You Know
Tuesday, March 5 | 5:10 PM PT
Here’s JP to talk about the three things you’ll learn about ERP security when you attend our session next week. And don’t forget to stop by our booth, #5464, so you can meet the rest of our experts and ask your questions about how to secure these business-critical applications.
About the Author
As CTO, JP leads the innovation team that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical acclaim for the Onapsis Research Labs. JP is regularly invited to speak and host trainings at global industry conferences, including Black Hat, HackInTheBox, AppSec, Troopers, Oracle OpenWorld and SAP TechEd, and is a founding member of the Cloud Security Alliance (CSA) Cloud ERP Working Group. Over his professional career, JP has led many Information Security consultancy projects for some of the world’s biggest companies around the globe in the fields of penetration and web application testing, vulnerability research, cybersecurity infosec auditing/standards, vulnerability research and more.
More about this author
Further Reading
How to Execute an SAP Incident Response Strategy: The Step-by-Step Playbook
Most Security Operations Centers (SOCs) operate with a dangerous blind spot. While they have mature playbooks for isolating infected endpoints or blocking malicious IPs at the firewall, they often lack a specific protocol for the organization’s most critical asset: the ERP system. This gap is existential. You cannot simply “pull the plug” on a production…
The Dangers of AI in Custom Code: How to Secure Your SAP Landscape
The evolution of AI has revolutionized the velocity of modern software development bringing unprecedented efficiencies. But at the same time, it introduces new security and compliance risks to your custom code that can be catastrophic if left unaddressed. The era of slow, manual code review is over. To survive the sheer volume of AI-generated content,…
How to Build an SAP Threat Intelligence Program in 2026
Traditional perimeter-based defenses were designed for a different era. In today’s landscape, threat actors weaponize vulnerabilities within a critical 72-hour exploit window following disclosure. This speed means that relying solely on monthly patching cycles leaves business-critical applications exposed to attack long before fixes can be implemented. To secure the digital core in 2026, organizations must…
