Proving business-critical application security not only takes next-level solutions, it also takes thought leadership. Here you'll find a growing library of materials to help you build your business-critical application security strategy and drive your company forward, confidently.

ERP Applications Under Fire

How cyberattackers target the crown jewels

Date: Wednesday, August 29 Time: 12PM ET
Presented by:

Join us, and digital risk management firm, Digital Shadows, for this webcast to review our latest research report that provides evidence that cyberattackers are targeting ERP systems, SAP and Oracle.

Attendees will have the chance to speak directly with the writers of the report with a live Q&A.

Meet the Speakers

Juan Pablo Perez-Etchegoyen

CTO and Co-founder at Onapsis

Juan Pablo leads the research & development team that keeps Onapsis on the cutting-edge of the Business-Critical Application Security market. He is responsible for the design, research and development of Onapsis’s innovative software solutions and helps manage the development of new products as well as the SAP cybersecurity research that has garnered critical acclaim for the Onapsis Research Labs.

He is regularly invited to speak and host trainings at global industry conferences including Blackhat, HackInTheBox, Troopers, and SAP TechEd/DCODE.

Michael Marriott

Senior Strategy and Research Analyst at Digital Shadows

Michael Marriott is a Senior Strategy and Research Analyst at Digital Shadows, which he joined in late 2014. Michael has a passion for security analysis and the trends they indicate, in order to better protect clients. He has written several articles and papers, and his research is regularly features in the press. He holds a BA in History and a Masters in Applied Security and Strategy, both from the University of Exeter.

Secure your 
business-critical SAP,
Oracle, Salesforce
and SaaS apps

Get a firsthand look at the visibility, reporting and automation capabilities provided by The Onapsis Platform by scheduling a personalized demo with our application security experts.

Request a demo