The CISO Imperative: Taking Control of SAP Cyber Attacks
- LANGUAGE: English DATE: Tuesday, September 29, 2015 TIME: 2:00pm CEST, 1:00pm GMT
It is impossible to overestimate the importance of SAP system security for modern enterprises. SAP solutions are widely used in all industries to store sensitive information and run critical business processes: from Enterprise Resource Planning and Human Resources systems to Business Intelligence to Customer Relationship and Supply Chain Management. Constant availability and protection of SAP systems is critical for over 250,000 enterprises around the world, as is their continued visibility and auditability to ensure compliance.
Unfortunately, although most companies focus on addressing business logic security with GRC solutions, securing SAP application platform and network infrastructures is often left to existing general security tools like firewalls and antivirus services. However, such tools are incapable of identifying application-specific vulnerabilities, misconfigurations or abnormal behavior patterns, because they lack relevant context information about SAP systems. Only specialized solutions that combine such information with the latest vulnerability intelligence are capable of providing reliable protection against SAP cyber-attacks.
In this webinar you will learn about:
- The security challenges of protecting business-critical applications against advanced cyber-attacks;
- Main attack vectors against SAP environments and how they can be used to gain access to sensitive information;
- Context-aware technologies that enable early discovery and remediation of security and compliance risks, as well as quick response to malicious activities.
In the first part of this webinar, Alexei Balaganski, Senior Analyst at KuppingerCole, will provide an overview of the security challenges that IT experts tasked with protecting business-critical applications are facing and explain why traditional security tools cannot provide adequate protection against advanced cyber-attacks.
In the second part, Alex Horan, Product Manager at Onapsis, will demonstrate how easily critical SAP systems can be exploited and explain how having a context-aware insight into SAP environments is critical for early detection and quick remediation of security problems.
Speakers
Platinum Sponsor
101 Arch Street - 17th Floor • MA 02110 Boston • USA
Phone: +1 6176039932
Internet: http://www.onapsis.com/
Onapsis provides the most comprehensive solutions for securing business-critical applications. As the leading experts in SAP cyber-security, Onapsis’ enables security and audit teams to have visibility, confidence and control of advanced threats, cyber-risks and compliance gaps targeting their enterprise applications.
Onapsis serves over 160 Global 2000 customers, including 10 top retailers, 20 top energy firms and 20 top manufacturers. Onapsis’ solutions are also the de-facto standard for leading consulting and audit firms such as Accenture, IBM, Deloitte, E&Y, KPMG and PwC.
Onapsis solutions include the Onapsis Security Platform, which is the most widely-used SAP-certified cyber-security solution in the market. Unlike generic security products, Onapsis’ context-aware solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data.
For more information, please visit www.onapsis.com, or connect with us on Twitter, Google+, or LinkedIn.

Downloads
Trending Videos
Next Webinar
Erfolgreiche IAM-Projekte: Von Best Practices Lernen
Jul 05, 2022
Häufig beginnt die Suche nach einer Identity-Lösung mit einem ganz konkreten Schmerzpunkt im Unternehmen. Ein nicht bestandener Compliance-Audit wegen überhöhter Zugriffsberechtigungen, technische Probleme, wegen komplexer Systeme frustrierte User und eine Überforderung des Helpdesk mit Berechtigungsanforderungen und Passwort-Resets sind nur einige der vielen möglichen Ursachen. Selbst nach einer erteilten Budgetfreigabe für die Anpassung der IAM-Landschaft sind die Hürden vielfältig.