Onapsis Resources

Access our in-depth hub of resources on ERP security reports, webinars, podcasts, and more.

Resource Placeholder

How a Fortune 500 Utility Achieved an On-Time, On-Budget RISE with SAP Go-Live

With the Onapsis partnership, the utility company saw great success by starting early and building security into their RISE with SAP transformation project.

Resource Placeholder

SAP Security is Everyone’s Responsibility: Focus on Utilities with Eversource

In this session you will learn how Eversource is adapting to the evolving threat landscape. Hear from security leaders about why they chose Onapsis and how leveraging the Platform has helped to save money, ensure security, and pinpoint vulnerabilities.

Resource Placeholder

The Book on Cybersecurity for SAP

Get the definitive guide to SAP cybersecurity, co-authored by experts from Onapsis and Under Armour. Learn key security principles, frameworks, and tools to protect your SAP systems. Download the first chapter and claim your free copy today.

Resource Placeholder

2024 Year in Review with Onapsis Research Labs

With 2024 behind us, the best way to prepare for a successful 2025 is to evaluate the past. JP Perez-Etchegoyen and Paul Laudanski from Onapsis Research Labs (ORL) recap trends from 2024 and provide best practices to prepare you for threats targeting business critical applications in 2025.

Resource Placeholder

The Defenders Digest Episode 15

Everything you need to know in the world of ERP security with The Defenders Digest. Hear directly from Paul Laudanski & JP Perez-Etchegoyen of Onapsis Research Labs as they chat through monthly highlights and need-to-know information around SAP and Oracle security.

Resource Placeholder

Maximizing Security in RISE with SAP

SAP offers a highly secure and compliant cloud infrastructure for RISE with SAP customers. With the peace of mind that SAP is managing the security of the foundational layers, customers can concentrate on their own security and compliance responsibilities: protecting business processes, sensitive data, and any extensions or customizations.

Resource Placeholder

Anatomy of an Attack: Breaking Down a C2 Incident on SAP

Onapsis Research Labs observed and analyzed malicious activity detected though our global threat intelligence cloud. A system running SAP was compromised and turned into a command and control bot by injecting a malicious file via an SAP vulnerability. The C2 initiated a distributed denial of service attack involving Cloudflare. Our team will review the details…

Resource Placeholder

NIS2 Directive Unveiled: Key Changes, Compliance Strategies, and SAP System Safeguards

In this session we explore the transformative changes introduced by the NIS2 Directive. This discussion will provide a comprehensive overview of how NIS2 differs from the original NIS Directive and what these changes mean for organizations relying on SAP systems. Organizations across the EU are going to be impacted when NIS2 goes into effect and…

Resource Placeholder

Maximizing Application Security in RISE with SAP: A Collaborative Approach with SAP, Onapsis and Deloitte

In this webinar we dive into the intricacies of the shared responsibility model within RISE with SAP. Representatives from SAP, Onapsis, and Deloitte will lead this session, providing valuable insights into the specific roles and responsibilities each organization plays in helping clients enhance SAP application security. Learn how these industry leaders collaborate to create a…

Page 5 of 32