WebcastCyber Tech Talk Features: The Onapsis Research Labs
In this session learn more about the latest threat intelligence and receive security guidance from the Onapsis Research Labs to stay ahead of ever-evolving cybersecurity threats.
WebcastLe paysage des menaces se transforme : mieux comprendre comment protéger les applications critiques SAP contre les menaces
Les applications SAP hébergent les informations clients, ventes, finances, les produits, les services, les informations sur les employés et les secrets commerciaux - et les pirates informatiques s’intéressent à ces applications. Le groupe Elephant Beetle a exploité, entre autres, deux vulnérabilités SAP et ainsi voler des millions de dollars à des organisations financières.
WebcastCyber Tech Talk Series | The Elephant Beetle in the Room: An Advanced Financial Attack Leveraging SAP Vulnerabilities
Learn how SAP vulnerabilities were exploited to drain millions of dollars from major financial organizations by an advanced threat group dubbed ‘Elephant Beetle’. In this session we discuss their modus operandi, provide actionable guidelines on how to bolster SAP security processes and how to defeat attacks of this nature in case of a breach.
WebcastICMAD SAP Cybersecurity Vulnerabilities
Who Is at Risk & How to Protect Your Business-Critical SAP Applications. SAP CISO and Onapsis CEO deliver an executive webinar, sharing new threat intelligence about SAP vulnerabilities impacting Internet Communication Manager (ICM). Apply security patches to protect SAP applications and improve SAP security posture.
WebcastCyber Tech Talk Series - Transformation Takeaways: 4 Learnings From Industry Leaders
Many organizations have correctly realized that security needs to be considered from the start of major digital transformation projects, and have started including security leaders in project planning and execution. However, most security leaders lack the visibility and/or understanding of SAP they need to effectively measure risk and enforce security baselines for the project. Hear from key industry leaders on the importance of SAP security and how to eliminate this blindspot so security leaders can understand risk and respond accordingly.
WebcastHow to Secure Your Business-Critical SAP Applications Against Modern Ransomware
In this on-demand fireside chat, Richard Puckett, CISO of SAP, and Mariano Nuñez, CEO of Onapsis, talk about today’s sophisticated and dynamic ransomware attacks and the key actions, best practices and controls you should implement to mitigate your business’s risk.
WebcastUtilities OG&E: Fireside Chat
Hear from Oklahoma’s largest electric utility, Oklahoma Gas & Electric Company (OGE Energy Corp), on how they have approached their security holistically, taking familiar security best practices and implementing them at both the OT & IT level.
WebcastCyber Tech Talk Series - 4 Things to Consider as You Select a Vulnerability Management Provider
Dig into implementation best practices and integration must-haves. We’ll review tips, tricks, and techniques to get the most from a vulnerability management program.
WebcastCyber Tech Talk Series - CIO Insights: 4 Focus Areas for 2022
Better understand the executive- and board-level conversations happening around business-critical application security and program blind spots. What are your CIO peers focusing on in 2022? What can CISOs, infosec leaders, and application owners do to support the office of the CIO?
WebcastCyber Tech Talk Series - 4 Reasons Why You Need Vulnerability Management
A deep dive into the current environmental and business dynamics that your cybersecurity portfolio must account for. Understand the novel, emergent threats that the Onapsis Research Lab is observing and reporting on.
WebcastSecure What Matters: Insights on Protecting Your Business-Critical Applications
There’s a hole in your defense-in-depth security models - the application layer. Traditional vulnerability management solutions don’t provide deep (or any!) coverage for business-critical applications from SAP, Oracle, and SaaS vendors, leaving organizations at risk of attack from threat actors. If this hole isn’t patched and vulnerabilities are not efficiently addressed, it can lead to application downtime or performance degradation - or worse - production downtime and significant revenue loss.
WebcastExecutive Panel: The CISOs Role as a Leader in Digital Transformation
Digital transformations promise efficiencies, customer satisfaction and new revenue opportunities, but they also vastly expand a company’s risk surface across new cloud, mobile applications and next-generation database technologies. CISOs must adapt their organizations to this new attack surface, or face the consequences.