Webcast
Active SAP Exploitation Activity Identified by the Onapsis Research LabsThis session with SAP, CISA and Onapsis covers the latest developments in the Threat Landscape for SAP business-critical applications.
Webcast
Cyber Tech Talk Features: The Onapsis Research LabsIn this session learn more about the latest threat intelligence and receive security guidance from the Onapsis Research Labs to stay ahead of ever-evolving cybersecurity threats.
Webcast
Le paysage des menaces se transforme : mieux comprendre comment protéger les applications critiques SAP contre les menacesLes applications SAP hébergent les informations clients, ventes, finances, les produits, les services, les informations sur les employés et les secrets commerciaux - et les pirates informatiques s’intéressent à ces applications. Le groupe Elephant Beetle a exploité, entre autres, deux vulnérabilités SAP et ainsi voler des millions de dollars à des organisations financières.
Webcast
Cyber Tech Talk Series | The Elephant Beetle in the Room: An Advanced Financial Attack Leveraging SAP VulnerabilitiesLearn how SAP vulnerabilities were exploited to drain millions of dollars from major financial organizations by an advanced threat group dubbed ‘Elephant Beetle’. In this session we discuss their modus operandi, provide actionable guidelines on how to bolster SAP security processes and how to defeat attacks of this nature in case of a breach.
Webcast
ICMAD SAP Cybersecurity VulnerabilitiesWho Is at Risk & How to Protect Your Business-Critical SAP Applications. SAP CISO and Onapsis CEO deliver an executive webinar, sharing new threat intelligence about SAP vulnerabilities impacting Internet Communication Manager (ICM). Apply security patches to protect SAP applications and improve SAP security posture.
Webcast
Cyber Tech Talk Series - Transformation Takeaways: 4 Learnings From Industry LeadersMany organizations have correctly realized that security needs to be considered from the start of major digital transformation projects, and have started including security leaders in project planning and execution. However, most security leaders lack the visibility and/or understanding of SAP they need to effectively measure risk and enforce security baselines for the project. Hear from key industry leaders on the importance of SAP security and how to eliminate this blindspot so security leaders can understand risk and respond accordingly.
Webcast
How to Secure Your Business-Critical SAP Applications Against Modern RansomwareIn this on-demand fireside chat, Richard Puckett, CISO of SAP, and Mariano Nuñez, CEO of Onapsis, talk about today’s sophisticated and dynamic ransomware attacks and the key actions, best practices and controls you should implement to mitigate your business’s risk.
Webcast
Utilities OG&E: Fireside ChatHear from Oklahoma’s largest electric utility, Oklahoma Gas & Electric Company (OGE Energy Corp), on how they have approached their security holistically, taking familiar security best practices and implementing them at both the OT & IT level.
Webcast
Cyber Tech Talk Series - 4 Things to Consider as You Select a Vulnerability Management ProviderDig into implementation best practices and integration must-haves. We’ll review tips, tricks, and techniques to get the most from a vulnerability management program.
Webcast
Cyber Tech Talk Series - CIO Insights: 4 Focus Areas for 2022Better understand the executive- and board-level conversations happening around business-critical application security and program blind spots. What are your CIO peers focusing on in 2022? What can CISOs, infosec leaders, and application owners do to support the office of the CIO?
Webcast
Cyber Tech Talk Series - 4 Reasons Why You Need Vulnerability ManagementA deep dive into the current environmental and business dynamics that your cybersecurity portfolio must account for. Understand the novel, emergent threats that the Onapsis Research Lab is observing and reporting on.
Webcast
Secure What Matters: Insights on Protecting Your Business-Critical ApplicationsThere’s a hole in your defense-in-depth security models - the application layer. Traditional vulnerability management solutions don’t provide deep (or any!) coverage for business-critical applications from SAP, Oracle, and SaaS vendors, leaving organizations at risk of attack from threat actors. If this hole isn’t patched and vulnerabilities are not efficiently addressed, it can lead to application downtime or performance degradation - or worse - production downtime and significant revenue loss.