At Onapsis, we’re not only solution leaders—we’re also thought leaders. Here you’ll find a growing library of materials to help you build your cyber resilience strategy. The more light we can shed on business-critical application security and compliance, the better you can drive your business forward, confidently.

Videos
Learn how to address security, compliance and availability early in the application development lifecycle with our four-part SAP Code and Transport video series.
Webinars

Duration: 45 minutes
Available On Demand

Cloud migration has become one of the hottest topics we’ve encountered in 2020 so far. There are many pitfalls and new complexities to consider when migrating your business-critical applications to the cloud, as security and availability are a high priority. Join Onapsis and Microsoft as we cover how to ensure your migration project is secure from start to finish and tools and best practices to help you with your migration.

Webinars

Duration: 21 minutes
Available On Demand


The SAP threat landscape is expanding and these critical applications are increasingly under attack. Join Anand Kotti, Cyber Security Expert at Onapsis, to learn about the latest threat vectors and critical vulnerabilities that are you putting your business operations at risk, including the most recent RECON vulnerability which affected over 40,000 SAP customers and resulted in a DHS US-CERT Alert and more than ten other global alerts. The session will also include a live demo of how an attacker can quickly compromise SAP applications through the 10KBlaze exploit and actionable guidance on how to mitigate these risks to your mission-critical systems.
 

Videos
Join VP of Business Application Cybersecurity at Onapsis, Jason Frugé, as he discusses various information security strategies, incorporating his love for whiskey, cigars and BBQ.
Webinars

Duration: 60 minutes
Available On Demand

This session will discuss how the Onapsis Research Labs and SAP Security Response Team collaborated to patch the critical RECON vulnerability in record time. You will also learn the details of the RECON vulnerability, who is at risk, what SAP systems are affected, what the business impact could be if exploited and how to protect your organization.

Reports
Onapsis has discovered and worked with SAP to release a patch for the RECON vulnerabilities, affecting a component included in many SAP applications.
Webinars

Duration: 45 minutes
Available On Demand

This session will cover the recent Onapsis Threat Report highlighting a serious example of what a potential attack on Oracle General Ledger would mean to an organization’s financials—presenting a deficiency in IT general controls for Sarbanes-Oxley (SOX) compliance for publicly-traded companies.  

Reports

Oracle BigDebIT vulnerabilities put thousands of organizations at risk. Onapsis threat research has discovered this major financial and compliance risk to companies who may not have the latest patch from Oracle.

Webinars

Duration: 26 minutes
Available On Demand

Oracle released its second Critical Patch Update (CPU) of the year. Containing 397 new security patches, this is a historical mark for Oracle, as it has never released this many patches on a single patch day since at least 2005. The April CPU release also includes a total of 74 patches for Oracle E-Business Suite (EBS), one of the most used ERP systems in the world. 

Webinars

Duration: 38 minutes
Available On Demand

Live Date: April 29, 2020

Managing Up Means Understanding The Role of Your CIO. A strong company needs a developed IT strategy to remain connected and competitive. The complexity of these IT projects, including digital transformation, is higher than ever.

Webinars

Duration: 1 hour
Available On Demand

Live Date: April 23, 2020

This joint session with Protiviti will lay the foundation for proper cyber program activities and detail how the Onapsis platform provides the required capabilities to defend against risk and drive growth during transformations. 

Webinars

Duration: 39 minutes
Available On Demand

Live Date: April 17, 2020

See how an attacker can infiltrate your SAP system by abusing well-known misconfigurations, Understand the most common attack vectors towards your SAP landscape, Learn how you can protect yourself by using SAP security automation and alerting.

Request a
Business Risk Illustration

OPERATIONAL RESILIENCY ASSESSMENT

Prevent application downtime and costly business disruption

Request an Assessment
AUDIT EFFICIENCY ASSESSMENT

Eliminate resource consuming manual audit processes

Request an Assessment
CYBER RISK 
ASSESSMENT

Reduce vulnerabilities and misconfiguration to protect the business

Request an Assessment