We have about a week to go until this year’s RSA Conference in San Francisco! As you set your schedule for the week, there are many learning opportunities for you to take advantage of. We would like to invite you to stop by our speaking session on Tuesday, March 5 at 5:10 to see what our CTO, JP Perez-Etchegoyen has to share about the importance of including ERP applications, such as SAP and Oracle, in your security and compliance strategy.
Onapsis Speaking Session
Dissecting ERP Breaches: They’re More Common Than You Know
Tuesday, March 5 | 5:10 PM PT
Here’s JP to talk about the three things you’ll learn about ERP security when you attend our session next week. And don’t forget to stop by our booth, #5464, so you can meet the rest of our experts and ask your questions about how to secure these business-critical applications.
About the Author
As CTO, JP leads the innovation team that keeps Onapsis on the cutting edge of the Business-Critical Application Security market, addressing some of the most complex problems that organizations are currently facing while managing and securing their ERP landscapes. JP helps manage the development of new products as well as support the ERP cybersecurity research efforts that have garnered critical acclaim for the Onapsis Research Labs. JP is regularly invited to speak and host trainings at global industry conferences, including Black Hat, HackInTheBox, AppSec, Troopers, Oracle OpenWorld and SAP TechEd, and is a founding member of the Cloud Security Alliance (CSA) Cloud ERP Working Group. Over his professional career, JP has led many Information Security consultancy projects for some of the world’s biggest companies around the globe in the fields of penetration and web application testing, vulnerability research, cybersecurity infosec auditing/standards, vulnerability research and more.
More about this author
Further Reading
The 2,000-Hour Drain: Why Manual SAP ITGC Audits Are Costing You More Than Just Time
Manual SAP ITGC (IT General Controls) audits require extensive resource hours to satisfy regulatory requirements and internal stakeholders. While many organizations believe manual verification ensures compliance accuracy, relying on human effort to test sprawling SAP landscapes introduces significant operational costs and critical security risks. The Resource Drain: Where Do the Hours Go? Manual SAP ITGC…
Beyond the Basics: Why Comprehensive Application Security Testing for SAP is Non-Negotiable
The shift to the cloud and the rapid evolution of SAP S/4HANA have fundamentally changed the rules of secure software development. Many organizations assume that operating within the SAP ecosystem means built-in tools and the provider’s infrastructure will fully manage their security and compliance requirements. However, relying solely on baseline code security leaves critical vulnerabilities…
The NIST Cybersecurity Framework: What It Is and How to Apply It to SAP
The NIST Cybersecurity Framework provides a comprehensive methodology for organizations to manage cyber risk. Implementing the NIST framework within SAP systems secures the financial, operational, and human resources data that drives the global enterprise. Data breaches cost an average of $4.44 million globally, making robust SAP Governance, Risk, and Compliance strategies essential for modern businesses….
