Back To Resources

Webinars

Upcoming Live Webinars
Onapsis Webinar

A Year in Review with Onapsis Research Labs

JP Perez-Etchegoyen and Paul Laudanski from Onapsis Research Labs (ORL) recap SAP security trends from 2023 and provide best practices to prepare you for 2024.

SAP Cyber Hygiene Practices to Protect Your Enterprise’s Business Goals

Join David D’Aprile, Vice President of Product Marketing, and Alex Horan, Vice President of Product Management for a look back at 2023’s release highlights…

Onapsis Webinar

Onapsis Autumn 2023 Launch Review

Join David D’Aprile, Vice President of Product Marketing, and Alex Horan, Vice President of Product Management for a look back at 2023’s release highlights…

Onapsis Webinar

Navigating SAP Security: Strategies for Seamless Compliance

Join David D’Aprile, Vice President of Product Marketing, and Alex Horan, Vice President of Product Management for a look back at 2023’s release highlights…

Cyber Tech Talk – Mind the Gap

Unlock the secrets to fortifying your company’s digital defenses in this engaging webinar.

Resource Placeholder

Wipro & Onapsis Webinar

How secure is your SAP landscape? Discover the blind spots to secure the applications that run your business

Understand Your Security Responsibilities and Achieve SAP Cyber Resilience

Complex SAP landscapes create complex business and security challenges.

Resource Placeholder

The Real Impact of Vulnerabilities Affecting SAP September 2023

In this Webinar, hosted by JP Perez-Etchegoyen, Co-Founder & CTO at Onapsis, you will hear his take on the state of critical application security, thoughts on modern day SAP attacks and threat actor groups, and a new way of thinking about ERP security to protect what matters most to your organization.

SAP Security Essentials for Utility Providers

It’s no secret that true visibility and understanding of risk to SAP landscapes can be challenging to navigate, especially for utility companies. The good news? There is a path forward whether you are just starting your SAP security journey or looking to optimize your security practices.

Page 5 of 10