Back To Resources

Webinars

Upcoming Live Webinars

Security Survey Insights Dach 2022

In diesem kompakten Webinar möchten wir Ihnen die Ergebnisse der Security-Umfrage DACH 2022 vorstellen. Erfahren Sie welche Security-Topics andere Unternehmen vorantreiben und in welchen Bereichen grundlegend Handlungsbedarf besteht. Wir versorgen Sie mit aktuellen Zahlen und Handlungsempfehlungen.

Onapsis Webinar

Customer Spotlight: How Dow Chemical Leverages Onapsis for Harmonized, Proactive Security & Compliance

Onapsis customer, Dow Chemical, discusses their journey and best practices utilizing The Onapsis Platform and how they solve these challenges–bringing their cybersecurity and compliance functions together in harmony.

Avoiding Security Roadblocks to SAP S/4HANA Migrations

Build security into your SAP S/4HANA digital transformation migration by leveraging Onapsis from the start.

Active SAP Exploitation Activity Identified by the Onapsis Research Labs

This session with SAP, CISA and Onapsis covers the latest developments in the Threat Landscape for SAP business-critical applications.

Cyber Tech Talk Features: The Onapsis Research Labs

In this session learn more about the latest threat intelligence and receive security guidance from the Onapsis Research Labs to stay ahead of ever-evolving cybersecurity threats.

Resource Placeholder

Le paysage des menaces se transforme: Mieux comprendre comment protéger les applications critiques SAP contre les menaces

Les applications SAP hébergent les informations clients, ventes, finances, les produits, les services, les informations sur les employés et les secrets commerciaux – et les pirates informatiques s’intéressent à ces applications. Le groupe Elephant Beetle a exploité, entre autres, deux vulnérabilités SAP et ainsi voler des millions de dollars à des organisations financières.

The Elephant Beetle in the Room: An Advanced Financial Attack Leveraging SAP Vulnerabilities

Learn about ‘Elephant Beetle’ & their SAP vulnerability exploitation techniques. Enhance your SAP security and prevent similar attacks.

Onapsis Webinar

Log4j Vulnerability: Threat Intelligence and Mitigation Strategies to Protect Your SAP Applications

SAP and Onapsis share steps to protect business-critical SAP applications and improve SAP security to mitigate the threat of the Log4j vulnerability to the log4shell exploits.

Critical ICMAD Vulnerabilities: Who Is at Risk & How to Protect Your Business-Critical SAP Applications

Who Is at Risk & How to Protect Your Business-Critical SAP Applications. SAP CISO and Onapsis CEO deliver an executive webinar, sharing new threat intelligence about SAP vulnerabilities impacting Internet Communication Manager (ICM). Apply security patches to protect SAP applications and improve SAP security posture.

Page 7 of 9