Onapsis Research Labs observed and analyzed malicious activity detected though our global threat intelligence cloud. A system running SAP was compromised and turned into a command and control bot by injecting a malicious file via an SAP vulnerability. The C2 initiated a distributed denial of service attack involving Cloudflare. Our team will review the details…
In this session we explore the transformative changes introduced by the NIS2 Directive. This discussion will provide a comprehensive overview of how NIS2 differs from the original NIS Directive and what these changes mean for organizations relying on SAP systems. Organizations across the EU are going to be impacted when NIS2 goes into effect and…
In this webinar we dive into the intricacies of the shared responsibility model within RISE with SAP. Representatives from SAP, Onapsis, and Deloitte will lead this session, providing valuable insights into the specific roles and responsibilities each organization plays in helping clients enhance SAP application security. Learn how these industry leaders collaborate to create a…
Secure Both the Platform Itself and Code in Development for BTP
Reduce Manual Testing with Code Security Designed for SAP BTP
The threat landscape for SAP systems is rapidly expanding, with ransomware and malware attacks on the rise. While these attacks may not directly target SAP systems, they often impact connected systems or environments. A growing concern for SAP customers is the increase in social engineering and credential compromise attacks, which can expose valuable data within…
This session will show how Siemens Healthineers protects critical SAP assets proactively in a global environment on its transformation to SAP RISE with the help of Onapsis. Learn how the company ensures resilience and robustness against evolving cyber threats and maintains operational continuity and compliance.
RISE with SAP is a comprehensive suite of cloud-based applications, platforms, tools, and services that help businesses of all sizes accelerate their digital transformation. However, any migration to the cloud comes with security challenges. Using third-party security technology can enhance and expand your ability to protect your data and systems while transitioning into a RISE…
In today’s digital landscape, where data breaches and cyber threats are constantly evolving, safeguarding critical business systems like SAP Business Technology Platform (BTP) is paramount. This session will provide attendees with information about how and why it is important to secure their SAP BTP environments against cyber threats, as well as practical strategies for fortifying…