On Demand Webinar
Active SAP Exploitation Activity Identified by Onapsis, CISA & SAP

- The assets organizations can leverage from CISA to help with securing application
- Which vulnerabilities are currently being exploited by threat actors
- Tactics and behaviors that threat actors may exhibit when exploiting these vulnerabilities on unpatched SAP applications
- How you can leverage Onapsis technology to protect your SAP applications
Speakers
Richard Puckett CISO SAP
Juan Pablo Perez-Etchegoyen CTO Onapsis
Stephanie Kennelley Vulnerability Disclosure Analyst CISA

