The CISO Imperative: Taking Control of SAP Cyber Attacks

  • LANGUAGE: English DATE: Tuesday, September 29, 2015 TIME: 2:00pm CEST, 1:00pm GMT
Upcoming Webinars

It is impossible to overestimate the importance of SAP system security for modern enterprises. SAP solutions are widely used in all industries to store sensitive information and run critical business processes: from Enterprise Resource Planning and Human Resources systems to Business Intelligence to Customer Relationship and Supply Chain Management. Constant availability and protection of SAP systems is critical for over 250,000 enterprises around the world, as is their continued visibility and auditability to ensure compliance.

Unfortunately, although most companies focus on addressing business logic security with GRC solutions, securing SAP application platform and network infrastructures is often left to existing general security tools like firewalls and antivirus services. However, such tools are incapable of identifying application-specific vulnerabilities, misconfigurations or abnormal behavior patterns, because they lack relevant context information about SAP systems. Only specialized solutions that combine such information with the latest vulnerability intelligence are capable of providing reliable protection against SAP cyber-attacks.

In this webinar you will learn about:

  • The security challenges of protecting business-critical applications against advanced cyber-attacks;
  • Main attack vectors against SAP environments and how they can be used to gain access to sensitive information;
  • Context-aware technologies that enable early discovery and remediation of security and compliance risks, as well as quick response to malicious activities.

In the first part of this webinar, Alexei Balaganski, Senior Analyst at KuppingerCole, will provide an overview of the security challenges that IT experts tasked with protecting business-critical applications are facing and explain why traditional security tools cannot provide adequate protection against advanced cyber-attacks.

In the second part, Alex Horan, Product Manager at Onapsis, will demonstrate how easily critical SAP systems can be exploited and explain how having a context-aware insight into SAP environments is critical for early detection and quick remediation of security problems.


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Alex Horan is a Product Manager at Onapsis Inc. where he is responsible for the development of ERP vulnerability assessment, testing and securing solutions. Alex has over 15 years of experience working within the IT security industry, covering both software and hardware. As a result he brings a...

Platinum Sponsor

Onapsis provides the most comprehensive solutions for securing business-critical applications. As the leading experts in SAP cyber-security, Onapsis’ enables security and audit teams to have visibility, confidence and control of advanced threats, cyber-risks and compliance gaps targeting their enterprise applications.

Onapsis serves over 160 Global 2000 customers, including 10 top retailers, 20 top energy firms and 20 top manufacturers. Onapsis’ solutions are also the de-facto standard for leading consulting and audit firms such as Accenture, IBM, Deloitte, E&Y, KPMG and PwC.

Onapsis solutions include the Onapsis Security Platform, which is the most widely-used SAP-certified cyber-security solution in the market. Unlike generic security products, Onapsis’ context-aware solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data.

For more information, please visit, or connect with us on Twitter, Google+, or LinkedIn.

Watch now


Trending Videos

Next Webinar


Ensuring the Security of Microsoft Active Directory and Azure AD

In the face of increasing cyber-attacks by cybercriminals and nation-states, most organizations are investing in filling in the gaps in their cyber defenses, but as the landmark SolarWinds supply chain breach showed, securing Microsoft Active Directory (AD) is vital, but often overlooked.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00