Press Release

Onapsis Helps SAP Customers Secure Complex S/4HANA Migrations with Five Sessions at Cybersecurity for SAP Customers Event

BOSTON, MA – June 27, 2018 – Onapsis, the global experts in ERP and business-critical application cybersecurity and compliance, today announced that its Chief Technology Officer, Juan Pablo Perez-Etchegoyen, will present four sessions and a pre-event workshop at the 2018 Cybersecurity for SAP Customers Conference at the Panorama Hotel in Prague. This first annual conference, held alongside SAP BI & HANA 2018 and BASIS and SAP Administration 2018 will feature over 75 sessions from 50+ expert speakers.

As more and more SAP customers are actively migrating or planning migrations to SAP HANA platforms it is important to understand the risks associated and how to keep these platforms protected. To help customers understand this, Perez-Etchegoyen will present the following pre-conference workshop.

Title: Protecting Your Digital Transformation: Securing SAP HANA and SAP S/4HANA
Date: Wednesday, 27 June, 2018
Time: 9:00 – 12:00
Abstract: The number of companies running live on SAP S/4HANA continues to grow. SAP S/4HANA opens new doors for innovation, but the path must be charted properly to avoid unforeseen risks. Join this in-depth, 3-hour workshop to understand how digital transformation projects and methodologies can be aligned with an SAP cybersecurity program. This will allow you to move at the speed of innovation without compromising the security of your organization’s crown jewels. Attend this workshop to:

  • Understand how to securely deploy SAP HANA databases, avoiding critical vulnerabilities and misconfigurations
  • Learn some of the most common security risks that might affect your newly deployed SAP S/4HANA system
  • Discover how to align the SAP Activate methodology with an SAP cybersecurity program to ensure secure deployment of SAP S/4HANA
  • Learn what you need to do to ensure your cloud investment is properly secured, following standards from the Cloud Security Alliance

Onapsis will present the following sessions at Cybersecurity for SAP Customers:

Title: Detect and Respond: How to Tell if You Have Been Breached
Date: Wednesday, 27 June, 2018
Time: 14:30 – 15:30
Abstract: Being able to quickly detect a data or systems breach is paramount to mitigating the potential fallout and mounting an effective response. If your SAP systems are breached, it is important to have certain protocols in place to help with forensics and determine the level of impact to your organization. Attend this session to:

  • Learn the necessary steps to mount an effective response plan that identifies what has been compromised in an SAP environment
  • Determine the top vulnerabilities to patch in order to avoid attackers leveraging anti-forensic techniques, and gain tips to prepare against techniques that hackers use to avoid being detected during post-attack forensic investigations
  • Understand the most effective approach to monitor, normalize, and correlate information that can be leveraged to detect attacks

Title: My SAP System Has Been Breached, Now What? An Incident Response Plan
Date: Thursday, 28 June, 2018
Time: 15:15 – 16:15
Abstract: With the frequency of attacks targeting enterprise software on the rise, many SAP customers are currently facing the challenging reality of putting together an incident response plan in the event that a breach does occur. Attend this session to:

  • Walk through real-life examples of steps and missteps companies have taken in the wake of cyberattacks targeting their SAP environments
  • Examine current trends in SAP breaches and how to factor new data into detailed response plans
  • Learn how to quantify and respond to the impact of a potential system compromise

Title: Ask the Experts: Basis and SAP Administration and Cybersecurity for SAP Customers
Date: Thursday, 28 June, 2018
Time: 16:25 – 17:10
Abstract: Join Juan Pablo Perez-Etchegoyen, Onapsis and other leading experts on SAP cybersecurity as well as those who manage, deploy, and administer SAP solutions to get detailed answers to your toughest questions. Draw on the real-world experiences of some of the industry’s top technologists, tap into one-on-one time with experts, and walk away with detailed answers to the questions that matter most to you.

Title: Mapping Your SAP Systems to GDPR Compliance Requirements
Date: Thursday, 28 June, 2018
Time: 17:15 – 18:15
Abstract: With the recent GDPR mandate it is important to ensure that organizations are taking the necessary steps to ensure that their SAP implementations are compliant to avoid costly fines. Join Onapsis experts in this session to understand if EU citizen data is handled or stored in your SAP systems. Discover methods to locate, categorize, and secure this data to meet the aggressive GDPR compliance mandates. By attending, you’ll learn:

  • How to check if your organization manages EU citizen data
  • Which SAP systems handle citizen data
  • Methods to secure data housed in SAP systems
  • How to align your SAP security with GDPR compliance mandates

Title: Securing SAP Mobile Applications from Cyberattacks
Date: Friday, 29 June, 2018
Time: 12:00 – 13:00
Abstract: As part of the industry’s push toward accessing business functions via mobile apps, SAP has empowered users to develop and deploy mobile applications that allow them to access critical information. SAP Fiori, based on SAP NetWeaver, is a framework that allows porting of applications to customer’s mobile devices. While this is extremely convenient, it also introduces new security considerations, as millions of mobile devices are now connected to the infrastructure of any modern organization. Attend this session to:

  • Dissect current security threats targeting SAP Fiori and how they could affect SAP customers
  • Detail current methods to secure these applications to ensure enhanced security alongside increased user productivity
  • Walk through SAP Fiori implementation scenarios and their corresponding security considerations

About Onapsis
Onapsis cybersecurity solutions automate the monitoring and protection of your SAP and Oracle ERP and business-critical applications, keeping them compliant and safe from insider and outsider threats. As the proven market leader, global enterprises trust Onapsis to protect the essential information and processes that run their businesses.

Headquartered in Boston, MA, Onapsis serves over 200 customers including many of the Global 2000. Onapsis’s solutions are also the de-facto standard for leading consulting and audit firms such as Deloitte, IBM, Infosys and PwC.

Onapsis solutions include the Onapsis Security Platform™, which is the most widely-used SAP-certified cybersecurity solution on the market. Unlike generic security products, Onapsis’s context-aware solutions deliver both preventative vulnerability and compliance controls, as well as real-time detection and incident response capabilities to reduce risks affecting critical business processes and data. Through open interfaces, the platform can be integrated with leading SIEM, GRC and network security products, seamlessly incorporating enterprise applications into existing vulnerability, risk and incident response management programs.

These solutions are powered by the Onapsis Research Labs, who continuously provide leading intelligence on security threats affecting SAP and Oracle enterprise applications. Experts at the Onapsis Research Labs were the first to lecture on SAP cyberattacks and have uncovered and helped fix hundreds of security vulnerabilities to-date affecting SAP Business Suite, SAP HANA, SAP Cloud and SAP Mobile applications, as well as Oracle JD Edwards and Oracle E-Business Suite platforms. This patented technology is well known, industry wide, and has gained Onapsis recognition on the Deloitte Technology Fast-500, as a Red Herring North America Top 100 company and a SINET 16 Innovator.

For more information, please visit www.onapsis.com, or connect with us on Twitter, Google+, or LinkedIn.

Onapsis and Onapsis Research Labs are registered trademarks of Onapsis, Inc. All other company or product names may be the registered trademarks of their respective owners.