The Onapsis Research Labs first identified this vulnerability in May 2020 and has worked closely with the SAP Security Response Team on a mitigation strategy. More than 40,000 SAP customers may be vulnerable to RECON, with upwards of 2,500 Internet-facing systems facing even greater risk.
This session will cover the recent Onapsis Threat Report highlighting a serious example of what a potential attack on Oracle General Ledger would mean to an organization’s financials—presenting a deficiency in IT general controls for Sarbanes-Oxley (SOX) compliance for publicly-traded companies.
The Chief Information Officer (CIO) holds responsibility for all IT decisions affecting the company, a task that has increased in complexity since the early days of the internet. A strong company needs a developed IT strategy to remain connected and competitive. The complexity of these IT projects, including digital transformation, is higher than ever.
A live demo of key Onapsis capabilities will be performed to demonstrate how vulnerabilities, such as ABAP or HANA code, can be eliminated with tools such as their CodeProfiler.
See how an attacker can infiltrate your SAP system by abusing well-known misconfigurations, Understand the most common attack vectors towards your SAP landscape, Learn how you can protect yourself by using SAP security automation and alerting.
In this session, we’ll look at the common types of changes happening in your SAP landscape and how those might introduce security vulnerabilities that can roadblock productivity. We will also highlight reasons why this threat vector is a growing target for attackers.