Press Release

Onapsis Educates SAP Customers on Top Cybersecurity Challenges and Strategies with Five Presentations at SAP CyberSecurity 2017

Boston, MA – November 28, 2017 – Onapsis, the global experts in SAP and Oracle application cybersecurity and compliance, today announced that the company will present five live sessions during the SAP CyberSecurity Conference November 29th – December 1st in Las Vegas, NV. Onapsis will showcase the latest research available for the growing category of Business-Critical Application Security at booth #1 and will present best practices on the most pressing topics such as the evolution of SAP HANA security, securing SAP Mobile from cyberattacks and SAP and GDPR compliance. “The SAP cybersecurity market continues to mature as attackers progress the methods in which they use to gain access to an organization’s most critical information and processes. The sessions we will be leading during SAP CyberSecurity are key presentations for anyone looking to learn how to assess their critical SAP, SAP HANA and SAP Mobile systems for security gaps and the latest best practices to proactively mitigate them. Also, any organization that is facing the May 2018 GDPR compliance deadline will obtain insight into how to ensure their SAP landscape is compliant in order to avoid costly fines,” said Juan Perez-Etchegoyen, CTO, Onapsis.

Onapsis Presentations at SAP CyberSecurity 2017:

Securing SAP Mobile Applications From Cyberattacks Date: Wednesday, November 29, 2017 Time: 12:45pm – 1:45pm PST Location: Celebrity 6 Abstract: As part of the industry’s push toward accessing business functions via mobile apps, SAP has empowered users to develop and deploy mobile applications that allow them to access critical information. SAP Fiori, based on SAP NetWeaver, is a framework that allows porting of applications to customer’s mobile devices. While this is extremely convenient, it also introduces new security considerations, as millions of mobile devices are now connected to the infrastructure of any modern organization. Attend this session to:

  • Dissect current security threats targeting SAP Fiori and how they could affect SAP customers
  • Detail current methods to secure these applications to ensure enhanced security alongside increased user productivity
  • Walk through SAP Fiori implementation scenarios and their corresponding security considerations

Mapping Your SAP Systems To GDPR Compliance Requirements Date: Wednesday, November 29, 2017 Time: 3:10pm – 4:10pm PST Location: Sunset 1 Abstract: This session provides important details that every organization needs to know about the General Data Protection Regulation (GDPR). Find out how to know if your organization manages EU citizen data and if this mandate applies to you. Attend to learn:

  • How to determine which SAP systems handle citizen data
  • Which methods you can use to secure citizen data
  • How to align your SAP security teams to meet these new compliance requirements

The Evolution of SAP HANA Security Date: Thursday, November 30, 2017 Time: 10:15am – 11:15am PST Location: Melrose 2 Abstract: Over the past few years, SAP has included new features in SAP HANA to fulfill their customers’ business needs. However, adding more features can increase a platform’s attack surface. During this session, we’ll analyze the evolution of security for SAP HANA from its beginning to its recently released latest version, 2.0. Attend to:

  • Understand how the platform evolved through architectural changes, and gain insight into vulnerability patch management
  • Explore the process of vulnerability discovery and evaluation of fixes including some of the critical bugs uncovered
  • Get expert recommendations for how to protect your SAP HANA platform against attackers, as well as guidelines for effectively auditing and assessing SAP HANA systems

Detect and Respond: How To Tell If You Have Been Breached Date: Thursday, November 30, 2017 Time: 11:25am – 12:25pm PST Location: Melrose 2 Abstract: Being able to quickly detect a data or systems breach is paramount to mitigating the potential fallout and mounting an effective response. If your SAP systems are breached, it is important to have certain protocols in place to help with forensics and determine the level of impact to your organization. Attend this session to:

  • Learn the necessary steps to mount an effective response plan that identifies what has been compromised in an SAP environmentDetermine the top vulnerabilities to patch in order to avoid attackers leveraging anti-forensic techniques, and gain tips to prepare against techniques that hackers use to avoid being detected during post-attack forensic investigations
  • Understand the most effective approach to monitor, normalize, and correlate information that can be leveraged to detect attacks
  • Determine the top vulnerabilities to patch in order to avoid attackers leveraging anti-forensic techniques, and gain tips to prepare against techniques that hackers use to avoid being detected during post-attack forensic investigations

My SAP System Has Been Breached, Now What? An Incident Response Plan Date: Thursday, November 30, 2017 Time: 2:40pm – 3:40pm PST Location: Melrose 2 Abstract: With the frequency of attacks targeting enterprise software on the rise, many SAP customers are currently facing the challenging reality of putting together an incident response plan in the event that a breach does occur. Attend this session to:

  • Walk through real-life examples of steps and missteps companies have taken in the wake of cyber attacks targeting their SAP environments
  • Examine current trends in SAP breaches and how to factor new data into detailed response plans
  • Learn how to quantify and respond to the impact of a potential system compromise

About Onapsis

Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle applications, keeping them compliant and safe from insider and outsider threats. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses.

Headquartered in Boston, MA, Onapsis serves over 200 customers including many of the Global 2000. Onapsis’s solutions are also the de-facto standard for leading consulting and audit firms such as Accenture, Deloitte, E&Y, IBM, KPMG and PwC.

Onapsis solutions include the Onapsis Security Platform™, which is the most widely-used SAP-certified cybersecurity solution on the market. Unlike generic security products, Onapsis’s context-aware solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. Through open interfaces, the platform can be integrated with leading SIEM, GRC and network security products, seamlessly incorporating enterprise applications into existing vulnerability, risk and incident response management programs.

These solutions are powered by the Onapsis Research Labs, who continuously provide leading intelligence on security threats affecting SAP and Oracle enterprise applications. Experts at the Onapsis Research Labs were the first to lecture on SAP cyberattacks and have uncovered and helped fix hundreds of security vulnerabilities to-date affecting SAP Business Suite, SAP HANA, SAP Cloud and SAP Mobile applications, as well as Oracle JD Edwards and Oracle E-Business Suite platforms. Onapsis has been issued U.S. Patent No. 9,009,837 entitled “Automated Security Assessment of Business-Critical Systems and Applications,” which describes certain algorithms and capabilities behind the technology powering the Onapsis Security Platform™. This patented technology is well known, industry wide, and has gained Onapsis recognition on the Deloitte Technology Top 500, as a Red Herring North America Top 100 company and a SINET 16 Innovator.

For more information, please visit www.onapsis.com, or connect with us on Twitter, Google+, or LinkedIn.

Onapsis and Onapsis Research Labs are registered trademarks of Onapsis, Inc. All other company or product names may be the registered trademarks of their respective owners.