Onapsis Shows Global 2000 Organizations How to Operationalize SAP Cybersecurity

Live webcast shows CISOs how to use best practices to increase alignment of SAP cybersecurity

Boston, MA – January 20, 2016 Onapsis, the global experts in business-critical application security, today announced a live webcast to help chief information security officers (CISOs) at Global 2000 companies better align SAP cybersecurity with broader information security processes. SAP applications are targets of a new breed of breaches that are stealthy and easy to execute. The impact on an organization can result in financial fraud, sabotage or economic espionage. As threats will undeniably continue to become more widespread, it is critical that SAP cybersecurity processes become operationalized throughout an organization.

Scott Crawford, Research Director, Information Security of 451 Research will discuss key trends driving information security teams to change their approach to business-critical application security.

Troy Grubb, Manager, Information Security, Governance Risk and Compliance - CISSP, The Hershey's Company will share how he has implemented an SAP Security Strategy with KPIs that drives cross-functional collaboration.

The live webcast will be held January 21st, 2016 at 2:00 p.m. EST and will cover:

  • Best practices for SAP Cybersecurity designed for the CISO.
  • How to align Infosec, SAP BASIS, and SAP Security teams to operationalize SAP Cybersecurity processes within an organization.
  • Training recommendations and team structure.
  • Detection methods and response processes.

For more information, or to register please visit: https://www.onapsis.com/news-and-events/webcasts/CISO-imperative-operationalizing-SAP-cybersecurity

About Onapsis

Onapsis provides the most comprehensive solutions for securing SAP and Oracle business-critical applications. As the leading experts in SAP and Oracle cybersecurity, Onapsis enables security and audit teams to have visibility, confidence and control of advanced threats, cyber risks and compliance gaps affecting their enterprise applications.

Headquartered in Boston, Onapsis serves over 180 Global 2000 customers, including 10 top retailers, 20 top energy firms and 20 top manufacturers. Onapsis’ solutions are also the de-facto standard for leading consulting and audit firms such as Accenture, IBM, Deloitte, E&Y, KPMG and PwC.

Onapsis solutions include the Onapsis Security Platform (OSP), which is the most widely used SAP-certified cybersecurity solution in the market. Unlike generic security products, Onapsis’ context-aware solutions deliver preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. Through open interfaces, the platform can be integrated with leading SIEM, GRC and network security products, seamlessly incorporating enterprise applications into existing vulnerability, risk and incident response management programs.

These solutions are powered by the Onapsis Research Labs™, which continuously provide leading intelligence on security threats affecting SAP and Oracle enterprise applications. Experts of the Onapsis Research Labs were the first to lecture on SAP cyberattacks and have uncovered and helped fix hundreds of security vulnerabilities to date affecting SAP Business Suite, SAP HANA, SAP Cloud and SAP Mobile applications, as well as Oracle JD Edwards and Oracle E-Business Suite platforms.

For more information, please visit www.onapsis.com, or connect with us on Twitter, Google+, or LinkedIn.


Onapsis and Onapsis Research Labs are registered trademarks of Onapsis, Inc. All other company or product names may be the registered trademarks of their respective owners.

Request a
Business Risk Illustration

OPERATIONAL RESILIENCY ASSESSMENT

Prevent application downtime and costly business disruption

Request an Assessment
AUDIT EFFICIENCY ASSESSMENT

Eliminate resource consuming manual audit processes

Request an Assessment
CYBER RISK 
ASSESSMENT

Reduce vulnerabilities and misconfiguration to protect the business

Request an Assessment