Back To Resources

Podcasts

Upcoming Live Webinars
Onapsis Podcasts

RISE to the Occasion

Complex SAP landscapes create complex business and security challenges. Moving to a RISE with SAP program has the potential to simplify many aspects of this complexity. However, do you know what your security responsibilities are under RISE with SAP? As part of RISE with SAP, customers benefit from high-caliber, secure cloud infrastructure and various security…

Onapsis Podcasts

SAP Security Essentials for Utility Providers

It’s no secret that true visibility and understanding of risk to SAP landscapes can be challenging to navigate, especially for utility companies. The good news? There is a path forward whether you are just starting your SAP security journey or looking to optimize your security practices. In this Podcast SAP & Onapsis explore Oklahoma Gas…

Onapsis Podcasts

The Real Impact of Vulnerabilities Affecting SAP

In this Podcast you will hear JP Perez-Etchegoyen, Co-Founder & CTO at Onapsis, take on the state of critical application security, thoughts on modern day SAP attacks and threat actor groups, and a new way of thinking about ERP security to protect what matters most to your organization. In this session, we’ll cover:

Onapsis Podcasts

The Future of the Threat Landscape

The podcast explores the increasing cybersecurity threats to SAP systems, highlighting that attackers are quick to exploit vulnerabilities, often just days after patches are released. The discussion rounds out with insights on comprehensive vulnerability management, the specific threat of ransomware, and the influence of external factors like new legislation and evolving threats on cyber defense…

Onapsis Podcasts

Protecting Your Company from SAP Cyber Threats

Reflecting on over three decades of experience in tackling enterprise security, Founders & CEO’s Mariano Nunez (Onapsis) and Richard Hunt (Turnkey) will share their lessons learned and provide practical tips and best practices for securing your organization. We will examine how the approach to SAP security has shifted and the most significant threats facing organizations…

Onapsis Podcasts

1000 Reasons: Lessons Learned from a Decade of Business-Critical Application Security (Fireside chat with JP and Mariano)

Over a decade ago, Onapsis was founded in a small office in Buenos Aires, Argentina. Today, the organization has grown by leaps and bounds with a global presence and capabilities centered around protecting the critical systems of hundreds of the world’s leading brands including 20% of the Fortune 100. Join this fireside chat with two…

Onapsis Podcasts

ERP Digital Transformation: Big Trends and Bigger Security Challenges

As global organizations increasingly adopt cloud technology and undertake digital transformation initiatives, under-resourced teams often prioritize agility and speed over security. This webinar will explore the latest trends influencing ERP digital transformation and the broader challenges of securing these essential systems. Drawing on Onapsis’ decade-long experience in safeguarding top global brands, the session will delve…

Onapsis Podcasts

Shift Left: Five Reasons Why You Should Extend DevSecOps to Your SAP Environment

What is DevSecOps? It is the integration of security best practices into the application development lifecycle. As digital transformation projects accelerate the creation of new code and applications, security often takes a backseat to business application output. With the average SAP system containing over 2 million lines of custom code, large global enterprises are increasingly…

Onapsis Podcasts

The ERP Black Box: Five Reasons Why Your Vulnerability Management Program Must Include Your ERP Landscape

Often seen as a “black box” for several reasons, SAP and Oracle application landscapes present significant challenges for modern security professionals, resulting in a layered security approach around critical systems. However, neglecting to include these ERP applications in your vulnerability management program makes your organization more vulnerable to security breaches and data loss. In this…

Page 6 of 6