Back To Resources

Resources

Upcoming Live Webinars

Cybersecurity Threats and Challenges to SAP Systems 2025

Based on a survey of the SAPinsider community, this infographic explores the evolving cybersecurity threats impacting SAP systems.

Cybersecurity Threats and Challenges to SAP Systems 2025

Uncover 2025’s top SAP cybersecurity threats, from unpatched systems to data breaches. Get expert insights & investment recommendations to secure your critical SAP landscape.

Onapsis Webinar

Cybersecurity Threats and Challenges to SAP Systems 2025

Learn why data exfiltration is now the #1 SAP threat and how to overcome patching challenges. This Onapsis and SAPinsider webinar offers actionable strategies to secure your critical data.

Onapsis Webinar

Cybersecurity for SAP – Rethinking Risk, Readiness, and Resilience

Watch the authors of “Cybersecurity for SAP”, JP Perez-Etchegoyen and Gaurav Singh, as they talk you through their book and explore how to assess real-world threat scenarios, system-level vulnerabilities, and develop tools for a more robust enterprise cybersecurity strategy.

Onapsis Podcasts

ASUG Talks Roundtable: Cybersecurity in the Cloud

As SAP customers migrate to the cloud, cybersecurity is a critical component of those transformation projects. Moving your IT ecosystem and sensitive organizational data from bare-metal, on-premises environments into the cloud requires a dedicated security approach, especially as threat actors’ efforts grow more sophisticated. In this ASUG Talks Roundtable, we dig into how enterprises should…

Onapsis Webinar

SAP a l’heure du Cloud : Comprendre et appliquer le modèle de responsabilité partagée

Sécurisez SAP dans le cloud et comprenez le modèle de Responsabilité Partagée de RISE avec Onapsis.

SAP Cybersecurity Q&A with Authors Gaurav Singh and Juan Perez-Etchegoyen

Authors Gaurav Singh and Juan Perez-Etchegoyen recently took part in the SAP PRESS Book Club webinar series, where they answered reader questions about cybersecurity for SAP over the course of an hour.

Executive Threat Overview: Critical Zero-Day SAP Vulnerabilities Under Active Global Exploitation

By exploiting these vulnerabilities, unauthenticated threat actors can gain unrestricted remote access to SAP business-critical data and

Threat Briefing Report: Critical SAP Vulnerabilities (CVE-2025-31324 and CVE-2025-42999) Under Active Mass Exploitation

This consolidated threat advisory [TLP:CLEAR] is provided to support defenders in their assessment of exposure and compromise against the active mass exploitation of SAP security vulnerabilities CVE-2025-31324 and CVE-2025-42999.

Page 2 of 32