Back To Resources

Webinars

Upcoming Live Webinars
Onapsis Webinar

Critical SAP RECON Vulnerability: Who Is At Risk & How to Protect Your Business

The Onapsis Research Labs first identified this vulnerability in May 2020 and has worked closely with the SAP Security Response Team on a mitigation strategy. More than 40,000 SAP customers may be vulnerable to RECON, with upwards of 2,500 Internet-facing systems facing even greater risk.

Onapsis Webinar

BigDebIT Vulnerabilities in Oracle EBS – Impact & Remediation Deep Dive

This session will cover the recent Onapsis Threat Report highlighting a serious example of what a potential attack on Oracle General Ledger would mean to an organization’s financials—presenting a deficiency in IT general controls for Sarbanes-Oxley (SOX) compliance for publicly-traded companies. 

Onapsis Webinar

SAP Security: 5 Challenges of the CIO

The Chief Information Officer (CIO) holds responsibility for all IT decisions affecting the company, a task that has increased in complexity since the early days of the internet. A strong company needs a developed IT strategy to remain connected and competitive. The complexity of these IT projects, including digital transformation, is higher than ever.

Onapsis Webinar

Protiviti: Transform Your Business With Confidence by Tackling Your Cyber Risks Using Onapsis

A live demo of key Onapsis capabilities will be performed to demonstrate how vulnerabilities, such as ABAP or HANA code, can be eliminated with tools such as their CodeProfiler.

Onapsis Webinar

How to protect your SAP landscape against hackers

See how an attacker can infiltrate your SAP system by abusing well-known misconfigurations, Understand the most common attack vectors towards your SAP landscape, Learn how you can protect yourself by using SAP security automation and alerting.

Onapsis Webinar

SAP Transport Security: Transformation with Less Risk and More Efficiency

In this session, we’ll look at the common types of changes happening in your SAP landscape and how those might introduce security vulnerabilities that can roadblock productivity. We will also highlight reasons why this threat vector is a growing target for attackers.

Page 9 of 9