Hi [[ session.user.profile.firstName ]]

Qualys Webcasts

  • Date
  • Rating
  • Views
  • Streamlining Compliance Programs for Operational Security
    Streamlining Compliance Programs for Operational Security Tim White, Director of Product Management, Qualys Recorded: Apr 5 2018 52 mins
    Learn to effectively navigate the security risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation by participating in this Qualys webcast series.

    In this episode, Tim White, Director of Product Management at Qualys, will highlight the latest IT security and compliance challenges and discuss best practices to streamline compliance and risk programs using the Qualys Cloud Platform and its integrated Apps.

    You will learn some best practices on efficient ways to:
    -Assess security configurations of IT systems, wherever they reside
    -Log and track file changes across IT systems globally
    -Help security teams implement the CIS 20 Critical Security Controls
    -Automate collection and reporting of compliance data for both technical and non-technical controls
    -Automate and standardize vendor risk assessment
  • DevSecOps — Practical Steps to Seamlessly Integrate Security Into DevOps
    DevSecOps — Practical Steps to Seamlessly Integrate Security Into DevOps Chris Carlson, VP Product Management, Qualys Recorded: Mar 29 2018 52 mins
    Learn to effectively navigate the security risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation by participating in this Qualys webcast series.

    In this webcast, Chris Carlson, Vice President of Product Management at Qualys, will discuss digital transformation trends and how the use of new IT methodologies and technologies like DevOps, Agile development, elastic cloud computing, and containers are changing the security development life cycle.

    You will learn practical steps to seamlessly integrate security into your DevOps environments with best practices and use cases to help you:

    * Understand how digital transformation and the race to the cloud is impacting the security status quo
    * Identify how your existing security tools can be integrated seamlessly into DevOps pipelines using automation and orchestration
    * Create a metric-driven security program that reduces vulnerabilities without slowing down application development lifecycles
    * Learn how you can apply best practices and quick wins from this webcast to create a foundational program at your organization
  • Prioritization of Vulnerabilities in a Modern IT Environment
    Prioritization of Vulnerabilities in a Modern IT Environment Josh Zelonis and Jimmy Graham Recorded: Mar 14 2018 59 mins
    The combination of today’s fast changing IT environments, increasingly common “headline” vulnerabilities and swift weaponizing of exploits requires a more automated, continuous and precise approach. Defense methods such as IT asset inventory, vulnerability management, threat prioritization, and patch deployment all must adapt with new speed and scale to deliver continuous visibility of global IT assets and environments for the realities facing today’s digital business.

    Join Qualys along with featured guest speaker Josh Zelonis, Senior Analyst at Forrester, to discuss the practical realities of prioritization in the era of digital transformation, industrious attackers and headline vulnerability disclosures. How can security teams sort through thousands or millions of vulnerabilities in time to prioritize a subset of those, act appropriately, then report up the chain?

    By attending this webcast, you will understand:

    • What this new era of branded vulnerabilities and rapid exploitation means for IT security teams already faced with increased scale and sprawl of cloud, hybrid, on-premises and containerized environments
    • How teams can streamline capabilities in order to simplify security with fewer staff resources
    • How to unify your approach to asset inventory, vulnerability management threat intelligence as vulnerability risk management
    • Why continuous visibility across global IT assets and environments is essential for automating security
  • Securing the Container and Cloud DevOps Pipeline
    Securing the Container and Cloud DevOps Pipeline Hari Srinivasan, Director of Product Management, Qualys Recorded: Mar 1 2018 53 mins
    See a live demonstration of Qualys Container Security, the industry-leading solution for addressing security of containers in DevOps pipelines and deployments across cloud and on-premises environments.
  • The GDPR Deadline Readiness and Impact to Global Organizations Outside the EU
    The GDPR Deadline Readiness and Impact to Global Organizations Outside the EU Tim White, Director of Product Management, Qualys Recorded: Feb 15 2018 46 mins
    Learn how Qualys helps customers worldwide comply with the European Union General Data Protection Regulation (GDPR).
  • Securing IT Assets by Prioritizing Protection and Remediation
    Securing IT Assets by Prioritizing Protection and Remediation Jimmy Graham, Director of Product Management, Qualys Recorded: Feb 1 2018 31 mins
    See live demonstrations of Qualys Vulnerability Management, Asset Inventory, Threat Protection, and soon-to-be-released Patch Management.
  • Continuous Security and Compliance Monitoring for Global IT Assets
    Continuous Security and Compliance Monitoring for Global IT Assets Chris Carlson, VP Product Management, Qualys Recorded: Jan 18 2018 45 mins
    Learn how enterprises can achieve immediate visibility across on-premises, endpoint, and cloud IT environments with Qualys Cloud Platform and its powerful, natively integrated security and compliance applications.
  • Avoid Meltdown from the Spectre
    Avoid Meltdown from the Spectre Jimmy Graham, Director of Product Management, Qualys Recorded: Jan 17 2018 58 mins
    The recently disclosed Meltdown and Spectre vulnerabilities negatively impact the security of virtually every computer in the world today. These vulnerabilities allow an attacker to gain control of a computer’s processor and steal data located on that computer. Organizations that store data in the cloud are particularly susceptible.

    During this webcast, Jimmy Graham, Director of Product Management for Qualys Threat Protection and Asset Inventory, will showcase solutions that can help you determine the impact of Spectre and Meltdown across your global IT environments.

    By attending this webcast, you will understand how:
    • To quickly and easily visualize Spectre and Meltdown vulnerabilities within your environment
    • To track remediation progress as you patch against Spectre and Meltdown
    • The Qualys Asset Inventory and Threat Protection apps, which will help you automate detection and track remediation progress
    The webcast will include a live Q&A session.
  • Automating Critical Security Controls for Threat Remediation and Compliance
    Automating Critical Security Controls for Threat Remediation and Compliance John Pescatore and Tim White Recorded: Sep 28 2017 57 mins
    Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenges.

    The Center for Internet Security’s (CIS) Critical Security Controls (CSCs) were selected and prioritized by leading security experts to stop today’s most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and network infrastructure.

    In this webcast, SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance (PC), will discuss how you can achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs.

    The presentation will encompass:

    • An overview of the CIS Critical Security Controls, including ongoing updates
    • Success patterns organizations have demonstrated for using the controls to their advantage
    • How an automation can reduce the staffing load to determine whether controls are in place and effective
    • How to prioritize remediation efforts
    • Real-world examples of recent attacks that leveraged misconfigured systems

    This webcast will include a demo and Q&A session with the speakers.

Embed in website or blog