The CISO Imperative: Taking Control of SAP Cyber Attacks

  • LANGUAGE: English DATE: Tuesday, September 29, 2015 TIME: 2:00pm CEST, 1:00pm GMT
Upcoming Webinars
It is impossible to overestimate the importance of SAP system security for modern enterprises. SAP solutions are widely used in all industries to store sensitive information and run critical business processes: from Enterprise Resource Planning and Human Resources systems to Business Intelligence to Customer Relationship and Supply Chain Management. Constant availability and protection of SAP systems is critical for over 250,000 enterprises around the world, as is their continued visibility and auditability to ensure compliance.

Unfortunately, although most companies focus on addressing business logic security with GRC solutions, securing SAP application platform and network infrastructures is often left to existing general security tools like firewalls and antivirus services. However, such tools are incapable of identifying application-specific vulnerabilities, misconfigurations or abnormal behavior patterns, because they lack relevant context information about SAP systems. Only specialized solutions that combine such information with the latest vulnerability intelligence are capable of providing reliable protection against SAP cyber-attacks.

In this webinar you will learn about:

  • The security challenges of protecting business-critical applications against advanced cyber-attacks;
  • Main attack vectors against SAP environments and how they can be used to gain access to sensitive information;
  • Context-aware technologies that enable early discovery and remediation of security and compliance risks, as well as quick response to malicious activities.

In the first part of this webinar, Alexei Balaganski, Senior Analyst at KuppingerCole, will provide an overview of the security challenges that IT experts tasked with protecting business-critical applications are facing and explain why traditional security tools cannot provide adequate protection against advanced cyber-attacks.

In the second part, Alex Horan, Product Manager at Onapsis, will demonstrate how easily critical SAP systems can be exploited and explain how having a context-aware insight into SAP environments is critical for early detection and quick remediation of security problems.

Platinum Sponsors


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Alex Horan is a Product Manager at Onapsis Inc. where he is responsible for the development of ERP vulnerability assessment, testing and securing solutions. Alex has over 15 years of experience working within the IT security industry, covering both software and hardware. As a result he brings a...

Platinum Sponsor

Onapsis provides the most comprehensive solutions for securing business-critical applications. As the leading experts in SAP cyber-security, Onapsis’ enables security and audit teams to have visibility, confidence and control of advanced threats, cyber-risks and compliance gaps targeting their enterprise applications.

Onapsis serves over 160 Global 2000 customers, including 10 top retailers, 20 top energy firms and 20 top manufacturers. Onapsis’ solutions are also the de-facto standard for leading consulting and audit firms such as Accenture, IBM, Deloitte, E&Y, KPMG and PwC.

Onapsis solutions include the Onapsis Security Platform, which is the most widely-used SAP-certified cyber-security solution in the market. Unlike generic security products, Onapsis’ context-aware solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data.

For more information, please visit, or connect with us on Twitter, Google+, or LinkedIn.

Watch now


Presentation, KuppingerCole

Presentation, Onapsis

Webcast download

Popular Webcasts

Next Webinar


Secure Login for Highly-Regulated Hybrid Environments: Avoid Being Forced Into the Cloud

The march of the cloud is unstoppable. Eager to outsource the tedious and expensive maintenance of their IT infrastructures to a reliable 3rd party, most companies would dream of becoming cloud-native, at least in the long term. Needless to say, letting someone else run your identity management out there sounds like a great idea as well, hence the rising popularity of Identity-as-a-Service solutions that combine the latest technology achievements with the flexibility of the cloud.

Next Conference


European Identity & Cloud Conference 2019

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00