Back To Resources

Webinars

Upcoming Live Webinars
Resource Placeholder

Wipro & Onapsis Webinar

How secure is your SAP landscape? Discover the blind spots to secure the applications that run your business

Understand Your Security Responsibilities and Achieve SAP Cyber Resilience

Complex SAP landscapes create complex business and security challenges.

Resource Placeholder

The Real Impact of Vulnerabilities Affecting SAP September 2023

In this Webinar, hosted by JP Perez-Etchegoyen, Co-Founder & CTO at Onapsis, you will hear his take on the state of critical application security, thoughts on modern day SAP attacks and threat actor groups, and a new way of thinking about ERP security to protect what matters most to your organization.

SAP Security Essentials for Utility Providers

It’s no secret that true visibility and understanding of risk to SAP landscapes can be challenging to navigate, especially for utility companies. The good news? There is a path forward whether you are just starting your SAP security journey or looking to optimize your security practices.

Threat Briefing: Unpacking the Impact of Vulnerabilities Affecting SAP P4

Pablo Artuso from Onapsis Research Labs unpacks the P4CHAINS family of vulnerabilities in this on-demand threat breifing.

Resource Placeholder

Onapsis Research Labs Briefing: The Latest Threats to SAP Applications July 2023

Join the Onapsis Research Labs for a look back at an extremely active year of threats so far in 2023.

Resource Placeholder

Cyber Tech Talk Features: Eliminating SAP Security Blind Spots with NIST

In this webinar we discuss a strong foundational strategy to protect SAP environments where they are most vulnerable–the application layer.

Threat briefing – P4CHAINS (en français)

Dans ce webinaire, l’un de nos chercheurs détaillera cette série de vulnérabilités (P4CHAINS) et proposera nos consignes de sécurité pour y remédier.

Onapsis Webinar

1000 Reasons: Lessons Learned from a Decade of Business-Critical Application Security

Insights from Onapsis Founders on Protecting Critical Systems of Leading Brands and Modern-Day ERP Security Strategies

Page 5 of 9