Hi [[ session.user.profile.firstName ]]

Qualys Webcasts

  • Date
  • Rating
  • Views
  • Streamlining Third Party Risk Assessments in the Cloud
    Streamlining Third Party Risk Assessments in the Cloud Jonathan Osmolski, Enterprise Records & Information Governance, Pekin Insurance & Hariom Singh, Product Management Qualys Recorded: Jun 20 2017 59 mins
    Security assessments drastically reduce your organization’s risk of suffering a data breach by identifying poor InfoSec and privacy practices among vendors, partners, contractors, and other third parties.

    For most businesses, these assessments are a slow, unscalable, manual process that strains InfoSec teams and creates a backlog of security evaluations.

    During this webcast, Jonathan Osmolski, Manager of Enterprise Records and Information Governance at Pekin Insurance, and Hariom Singh, Director of Product Management for Qualys Security Assessment Questionnaire (SAQ) will show you how you can free your organization from unreliable and labor-intensive manual processes, and optimize the accuracy of audit results.

    You will learn how Pekin Insurance:

    > Replicated its manual 76-question assessment process within SAQ’s web-based UI in just two hours
    > Simplified the design, distribution, tracking, and analysis of multiple vendor risk assessment campaigns
    > Gained improved visibility into its compliance performance metrics
    Increased the overall productivity and efficiency of its InfoSec team

    This webcast will include a live demo and Q&A session.
  • Visualize Your Threat Exposure to WannaCry & Shadow Brokers With Dashboards
    Visualize Your Threat Exposure to WannaCry & Shadow Brokers With Dashboards Jimmy Graham, Director of Product Management, Qualys Recorded: Jun 1 2017 50 mins
    The WannaCry ransomware virus has wreaked havoc on hundreds of thousands of computers around the world since the outbreak began on May 12. This virus exploits vulnerabilities in Microsoft Windows XP and 2003, encrypting files and demanding that users pay a ransom to regain access. Determining whether the vulnerability exists within your global IT environment can be a daunting task, and existing enterprise security solutions are slow to deploy.

    Jimmy Graham, Director of Product Management for ThreatPROTECT at Qualys, will demonstrate how you can:

    • Identify, track, and remediate assets susceptible to critical vulnerabilities, including WannaCry and the recent Samba exploit
    • Create dashboards and reports to visualize the impact of assets in real time and track your remediation efforts
    • Institute threat-prioritized remediation processes to mitigate current and future risks

    This webcast will include a Q&A session with the speaker.
  • Countdown to GDPR - Reduce your Risk
    Countdown to GDPR - Reduce your Risk Darron Gibbard, Managing Director, EMEA North at Qualys & Jonathan Armstrong, Partner at Cordery Recorded: May 24 2017 60 mins
    This is a must-attend webcast for anyone working for an organisation within Europe and responsible for the security of personal data.

    You are probably already thinking about the EU General Data Protection Regulation (GDPR) and the huge potential fines of €20m or 4% of annual worldwide turnover.

    For organisations headquartered across EMEA, GDPR is a key focus for the next 12 months as the 25 May 2018 deadline approaches. Qualys solutions can help your organisation prepare and comply with GDPR.

    During this webcast, Jonathan Armstrong, Compliance and Technology Lawyer, Partner at Cordery, will answer any compliance questions and highlight the key areas to consider. Darron Gibbard, Managing Director, EMEA North at Qualys, will show you how to know and control your data, assets and suppliers.

    You will get practical advice on:

    - What you need to focus on: data, assets, suppliers
    - Who you should involve: key stakeholders and departments
    - How you can automate processes with Qualys Security Assessment Questionnaire

    This webcast will include a live Q&A session.
  • Spot & Patch Web App Bugs in One Click
    Spot & Patch Web App Bugs in One Click Vikas Phonsa, Product Management, Qualys WAF and Frank Catucci, Product Management, Qualys WAS Recorded: May 23 2017 57 mins
    Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security.

    Qualys simplifies web app security with an end-to-end solution.

    During this webcast, presenters Vikas Phonsa and Frank Catucci will show you how you can:

    * Scan your apps using Qualys Web Application Scanning (WAS)
    * Deploy one-click virtual patches for detected vulnerabilities in Qualys Web Application Firewall (WAF)
    * Manage it all from a centralized, cloud-based portal

    This webcast will include a live Q&A session.
  • How to Rapidly Identify Assets at Risk to WannaCry Ransomware
    How to Rapidly Identify Assets at Risk to WannaCry Ransomware Jimmy Graham, Director of Product Management, Qualys and Mark Butler, Chief Information Security Officer, Qualys Recorded: May 17 2017 77 mins
    A major ransomware attack using a leaked NSA exploit known as “WannaCry” has hit more than 150 countries since May 12. More than 200,000 infections globally have been detected and the attack, which uses the WannaCry (WanaCrypt0r 2.0) ransomware, continues to spread.

    WannaCry utilizes the ETERNALBLUE exploit targeting newly disclosed vulnerabilities (MS17-010). Once leaked, it took only 28 days for this exploit to be used in a full-scale cyber attack. Organizations that scan for vulnerabilities only monthly or less frequently can still be at risk.

    During this webcast Jimmy Graham, Director of Product Management at Qualys, and Mark Butler, Chief Information Security Officer at Qualys, will discuss how to:

    • Patch and implement other mitigations for WannaCry
    • Detect and get full visibility on impacted assets for prompt remediation
    • Institute threat-prioritized remediation processes to mitigate current and future risks

    This webcast will include a live Q&A session.
  • Gain Visibility & Control of IT Assets in a Perimeterless World
    Gain Visibility & Control of IT Assets in a Perimeterless World Jimmy Graham, Director, Product Management, AssetView and Darron Gibbard, Chief Technical Security Officer EMEA, Qualys Recorded: May 4 2017 45 mins
    In today’s perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks.

    The IT assets that pose the greatest risk to your organization’s security are the ones you don’t know are there. Lack of visibility into your IT environment undermines the foundations of your enterprise security and compliance infrastructure and puts your organization at serious risk of a breach. Without knowledge of which software and devices exist in your network — whether on-premises, on endpoints, or in elastic clouds — InfoSec professionals are unable to enact proper security and protection.

    During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA will cover the six key elements of an ideal cloud-based IT asset inventory system:

    1. Complete visibility of your IT environment
    2. Deep visibility into assets
    3. Continuous and automatic updates
    4. Asset criticality ranking
    5. Interactive, customizable dashboarding and reporting
    6. Integration with your CMDB


    Those of you in the EU will also be interested to learn about asset inventory for GDPR compliance.

    This webcast will include a live Q&A session.
  • Automated Compliance Assessment for RBI Cyber Security Guidelines
    Automated Compliance Assessment for RBI Cyber Security Guidelines Shailesh Athalye, Senior Manager, Compliance Research & Analysis, Qualys Recorded: May 3 2017 56 mins
    Perimeterless IT infrastructure and its security is now an integral part of the operational strategies of India’s financial institutions. But the number, frequency, and impact of cyber attacks on Indian financial institutions have increased substantially, underlining the urgent need for banks to develop robust cyber security measures, and assess their security posture on a continuous basis.

    The RBI Guidelines for Cyber Security assist financial institutions to achieve this through a new-era preventative security baseline.

    During this webcast, Shailesh Athalye, Qualys Senior Manager, Compliance Research and Analysis, will discuss how financial institutions can easily address both the technical & procedural elements of the RBI Guidelines for Cyber Security in an automated manner using the highly scalable Qualys Cloud Platform.

    This webcast will include a live Q&A session.
  • Detect and Block Apache Struts Bug Across Your Enterprise
    Detect and Block Apache Struts Bug Across Your Enterprise Vikas Phonsa Director Product Management Web App Firewall and Frank Catucci Director Product Management Web App Scanning Recorded: Mar 22 2017 62 mins
    A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.

    Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.

    During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.

    With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.

    This webcast will include a live demo and Q&A session.
  • Aligning Web Application Security  with DevOps and IoT Trends
    Aligning Web Application Security with DevOps and IoT Trends Amy DeMartine, Principal Analyst, Forrester. Jason Kent, VP Web App Security, Qualys Recorded: Feb 7 2017 54 mins
    For organizations around the world, attacks on web applications are quickly becoming the main source of data loss. As the proliferation of IoT devices complicates the web app security landscape, security teams must engage with key app development counterparts to better secure apps across new types of devices, without slowing rapid DevOps methods or adding InfoSec strain.

    During this webcast, guest speakers Amy DeMartine, Principal Analyst at Forrester, and Jason Kent, VP of Web Application Security at Qualys will cover how you can:

    - Secure apps at the speed of DevOps
    - Utilize web security and infrastructure security assessment practices in the age of IoT
    - Mitigate the risk presented by the new IoT attack surface with the help of automated testing tools and DevSecOps collaboration


    This webcast will include a Q&A session with our speakers.
  • Securing Your Web Apps in Today's Complex Cloud Environment
    Securing Your Web Apps in Today's Complex Cloud Environment Alex Jones, Security Engineer, Gainsight & Dave Ferguson, Solution Architect, Qualys Recorded: Nov 1 2016 58 mins
    Today, securing web applications has become more complex as organizations increasingly deploy and manage their web applications in the cloud. Modern web technologies such as sophisticated JavaScript frameworks and SPAs present increasing challenges to web application scanning, as crawling has become more difficult to manage.

    During this webcast Alex Jones from Gainsight and Dave Ferguson from Qualys will discuss how Qualys has helped Gainsight to:

    - Scan, discover, catalog applications on multiple cloud environments for vulnerabilities and website misconfigurations.

    - Adapt to increasingly complex and new web application technologies.

    - Build an easy-to-use, accurate and scalable scanning program across web application and network infrastructure.

Embed in website or blog