The CISO Imperative: Taking Control of SAP Cyber Attacks

  • LANGUAGE: English DATE: Tuesday, September 29, 2015 TIME: 2:00pm CEST, 1:00pm GMT
Upcoming Webinars

It is impossible to overestimate the importance of SAP system security for modern enterprises. SAP solutions are widely used in all industries to store sensitive information and run critical business processes: from Enterprise Resource Planning and Human Resources systems to Business Intelligence to Customer Relationship and Supply Chain Management. Constant availability and protection of SAP systems is critical for over 250,000 enterprises around the world, as is their continued visibility and auditability to ensure compliance.

Unfortunately, although most companies focus on addressing business logic security with GRC solutions, securing SAP application platform and network infrastructures is often left to existing general security tools like firewalls and antivirus services. However, such tools are incapable of identifying application-specific vulnerabilities, misconfigurations or abnormal behavior patterns, because they lack relevant context information about SAP systems. Only specialized solutions that combine such information with the latest vulnerability intelligence are capable of providing reliable protection against SAP cyber-attacks.

In this webinar you will learn about:

  • The security challenges of protecting business-critical applications against advanced cyber-attacks;
  • Main attack vectors against SAP environments and how they can be used to gain access to sensitive information;
  • Context-aware technologies that enable early discovery and remediation of security and compliance risks, as well as quick response to malicious activities.

In the first part of this webinar, Alexei Balaganski, Senior Analyst at KuppingerCole, will provide an overview of the security challenges that IT experts tasked with protecting business-critical applications are facing and explain why traditional security tools cannot provide adequate protection against advanced cyber-attacks.

In the second part, Alex Horan, Product Manager at Onapsis, will demonstrate how easily critical SAP systems can be exploited and explain how having a context-aware insight into SAP environments is critical for early detection and quick remediation of security problems.


Platinum Sponsors

Speakers

Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Alex Horan is a Product Manager at Onapsis Inc. where he is responsible for the development of ERP vulnerability assessment, testing and securing solutions. Alex has over 15 years of experience working within the IT security industry, covering both software and hardware. As a result he brings a...


Platinum Sponsor

Onapsis provides the most comprehensive solutions for securing business-critical applications. As the leading experts in SAP cyber-security, Onapsis’ enables security and audit teams to have visibility, confidence and control of advanced threats, cyber-risks and compliance gaps targeting their enterprise applications.

Onapsis serves over 160 Global 2000 customers, including 10 top retailers, 20 top energy firms and 20 top manufacturers. Onapsis’ solutions are also the de-facto standard for leading consulting and audit firms such as Accenture, IBM, Deloitte, E&Y, KPMG and PwC.

Onapsis solutions include the Onapsis Security Platform, which is the most widely-used SAP-certified cyber-security solution in the market. Unlike generic security products, Onapsis’ context-aware solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data.

For more information, please visit www.onapsis.com, or connect with us on Twitter, Google+, or LinkedIn.

Watch now

Downloads

Presentation, KuppingerCole

Presentation, Onapsis

Webcast download

Popular Webcasts

Next Webinar

Webinar

How to Stop Attacker Movement in Your Network Before They Reach your “Crown Jewels”

Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.

Next Conference

Conference

Blockchain Enterprise Days 2019

Blockchain is still on everyone’s lips and the 2019 can be the year when large enterprises finally embrace the distributed ledger technology. KuppingerCole's inaugural blockchain-themed event will go beyond the hype and will present you real use cases and applications for your enterprise. Blockchain Enterprise Days (#BeDays19) will take place on September 18-19, 2019 in Frankfurt, Germany.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00