Solution Brief
Cyber Risk Assessment40,000+ ORGANIZATIONS USING SAP ARE AT RISK OF RECON VULNERABILITY Successful Exploit Could Allow Unauthenticated Full System Access; Impact Business Operations and Regulatory Compliance
Webcast
Cyber Tech Talk Series - Transformation Takeaways: 4 Learnings From Industry LeadersMany organizations have correctly realized that security needs to be considered from the start of major digital transformation projects, and have started including security leaders in project planning and execution. However, most security leaders lack the visibility and/or understanding of SAP they need to effectively measure risk and enforce security baselines for the project. Hear from key industry leaders on the importance of SAP security and how to eliminate this blindspot so security leaders can understand risk and respond accordingly.
Webcast
How to Secure Your Business-Critical SAP Applications Against Modern RansomwareIn this on-demand fireside chat, Richard Puckett, CISO of SAP, and Mariano Nuñez, CEO of Onapsis, talk about today’s sophisticated and dynamic ransomware attacks and the key actions, best practices and controls you should implement to mitigate your business’s risk.
Webcast
Utilities OG&E: Fireside ChatHear from Oklahoma’s largest electric utility, Oklahoma Gas & Electric Company (OGE Energy Corp), on how they have approached their security holistically, taking familiar security best practices and implementing them at both the OT & IT level.
White Paper
Mitigating the Threat of Ransomware to Business-Critical SAP ApplicationsSAP and Onapsis share steps to protect business-critical SAP applications against modern ransomware attacks.
Webcast
Cyber Tech Talk Series - 4 Things to Consider as You Select a Vulnerability Management ProviderDig into implementation best practices and integration must-haves. We’ll review tips, tricks, and techniques to get the most from a vulnerability management program.
Webcast
Cyber Tech Talk Series - CIO Insights: 4 Focus Areas for 2022Better understand the executive- and board-level conversations happening around business-critical application security and program blind spots. What are your CIO peers focusing on in 2022? What can CISOs, infosec leaders, and application owners do to support the office of the CIO?
Webcast
Cyber Tech Talk Series - 4 Reasons Why You Need Vulnerability ManagementA deep dive into the current environmental and business dynamics that your cybersecurity portfolio must account for. Understand the novel, emergent threats that the Onapsis Research Lab is observing and reporting on.
Webcast
Secure What Matters: Insights on Protecting Your Business-Critical ApplicationsThere’s a hole in your defense-in-depth security models - the application layer. Traditional vulnerability management solutions don’t provide deep (or any!) coverage for business-critical applications from SAP, Oracle, and SaaS vendors, leaving organizations at risk of attack from threat actors. If this hole isn’t patched and vulnerabilities are not efficiently addressed, it can lead to application downtime or performance degradation - or worse - production downtime and significant revenue loss.
Webcast
Executive Panel: The CISOs Role as a Leader in Digital TransformationDigital transformations promise efficiencies, customer satisfaction and new revenue opportunities, but they also vastly expand a company’s risk surface across new cloud, mobile applications and next-generation database technologies. CISOs must adapt their organizations to this new attack surface, or face the consequences.
Webcast
Q&A Session with SAP & Onapsis: Active Cyberattacks on Mission-Critical SAP ApplicationsListen to a Q&A session with Richard Puckett, CISO at SAP and Mariano Nunez, CEO at Onapsis to discuss the key findings and actions to take to immediately protect your business.
Webcast
DevSecOps for SAP S/4HANA MigrationsSAP S/4HANA migration projects are a huge undertaking involving your organization’s most mission-critical applications. Your business relies on these applications to function, so ensuring they stay secure, compliant, and available throughout migration and beyond is absolutely critical.