At Onapsis, we’re not only solution leaders—we’re also thought leaders. Here you’ll find a growing library of materials to help you build your cyber resilience strategy. The more light we can shed on business-critical application security and compliance, the better you can drive your business forward, confidently.

ERP Applications Under Fire

How cyberattackers target the crown jewels

Date: Wednesday, August 29 Time: 12PM ET
Presented by:

Join us, and digital risk management firm, Digital Shadows, for this webcast to review our latest research report that provides evidence that cyberattackers are targeting ERP systems, SAP and Oracle.

Attendees will have the chance to speak directly with the writers of the report with a live Q&A.

Meet the Speakers

Juan Pablo Perez-Etchegoyen

CTO and Co-founder at Onapsis

Juan Pablo leads the research & development team that keeps Onapsis on the cutting-edge of the Business-Critical Application Security market. He is responsible for the design, research and development of Onapsis’s innovative software solutions and helps manage the development of new products as well as the SAP cybersecurity research that has garnered critical acclaim for the Onapsis Research Labs.

He is regularly invited to speak and host trainings at global industry conferences including Blackhat, HackInTheBox, Troopers, and SAP TechEd/DCODE.

Michael Marriott

Senior Strategy and Research Analyst at Digital Shadows

Michael Marriott is a Senior Strategy and Research Analyst at Digital Shadows, which he joined in late 2014. Michael has a passion for security analysis and the trends they indicate, in order to better protect clients. He has written several articles and papers, and his research is regularly features in the press. He holds a BA in History and a Masters in Applied Security and Strategy, both from the University of Exeter.

Request a
Business Risk Illustration


Prevent application downtime and costly business disruption

Request an assesment

Eliminate resource consuming manual audit processes

Request an assesment

Reduce vulnerabilities and misconfiguration to protect the business

Request an assesment