Bei Onapsis sind wir nicht nur führend im Bereich Lösungen - wir sind auch Vordenker. Hier finden Sie eine wachsende Bibliothek von Materialien, die Ihnen beim Aufbau Ihrer Cyber-Resilienz-Strategie helfen. Je mehr Transparenz wir zum Thema Sicherheit und Einhaltung geschäftskritischer Anwendungen schaffen können, desto besser können Sie Ihr Unternehmen zuversichtlich voranbringen.

Videos
Join VP of Business Application Cybersecurity at Onapsis, Jason Frugé, as he discusses various information security strategies, incorporating his love for whiskey, cigars and BBQ.
Webinars

Duration: 60 minutes
Available On Demand

This session will discuss how the Onapsis Research Labs and SAP Security Response Team collaborated to patch the critical RECON vulnerability in record time. You will also learn the details of the RECON vulnerability, who is at risk, what SAP systems are affected, what the business impact could be if exploited and how to protect your organization.

Reports
Onapsis has discovered and worked with SAP to release a patch for the RECON vulnerabilities, affecting a component included in many SAP applications.
Webinars

Duration: 45 minutes
Available On Demand

This session will cover the recent Onapsis Threat Report highlighting a serious example of what a potential attack on Oracle General Ledger would mean to an organization’s financials—presenting a deficiency in IT general controls for Sarbanes-Oxley (SOX) compliance for publicly-traded companies.  

Reports

Oracle BigDebIT vulnerabilities put thousands of organizations at risk. Onapsis threat research has discovered this major financial and compliance risk to companies who may not have the latest patch from Oracle.

Webinars

Duration: 26 minutes
Available On Demand

Oracle released its second Critical Patch Update (CPU) of the year. Containing 397 new security patches, this is a historical mark for Oracle, as it has never released this many patches on a single patch day since at least 2005. The April CPU release also includes a total of 74 patches for Oracle E-Business Suite (EBS), one of the most used ERP systems in the world. 

Webinars

Duration: 38 minutes
Available On Demand

Live Date: April 29, 2020

Managing Up Means Understanding The Role of Your CIO. A strong company needs a developed IT strategy to remain connected and competitive. The complexity of these IT projects, including digital transformation, is higher than ever.

Webinars

Duration: 1 hour
Available On Demand

Live Date: April 23, 2020

This joint session with Protiviti will lay the foundation for proper cyber program activities and detail how the Onapsis platform provides the required capabilities to defend against risk and drive growth during transformations. 

Webinars

Duration: 39 minutes
Available On Demand

Live Date: April 17, 2020

See how an attacker can infiltrate your SAP system by abusing well-known misconfigurations, Understand the most common attack vectors towards your SAP landscape, Learn how you can protect yourself by using SAP security automation and alerting.

Webinars

Duration: 35 minutes
Available On Demand

Live Date: April 9, 2020

Learn how to reduce the risk introduced through ongoing changes in your Software Development Life Cycle. We’ll look at the common types of changes happening in your SAP landscape and how those might introduce security vulnerabilities that can roadblock productivity.

Webinars

Duration: 39 minutes
Available On Demand

Live Date: May 12, 2020

Join and listen to a 20 year veteran of infosec speak to the lessons learned as an executive CISO. Explore some key lessons learned, such as “What the board expects of you” and “How to stay relevant in your organization.”

Webinars

Duration: 27 minutes
Available On Demand

Live Date: May 6, 2020

The more cyber security evolves, the more complex and difficult it becomes to get a grip on it. In this webinar, we focus on the current state of the cyber security industry and where it is leading to.

Fordern Sie eine kostenlose
Geschäftsrisiko-Illustration an

Untersuchen Sie die Sicherheitslage und das Risiko Ihrer geschäftskritischen Anwendungen, um die möglichen Auswirkungen eines Cyberangriffs auf Ihr Unternehmen zu ermitteln.

Assessment Anfordern