Hi [[ session.user.profile.firstName ]]

Did You Know? You Can Easily Respond to Constantly Evolving Internet Attacks.

With attacks on the rise and constantly changing, it’s more important than ever to respond fast. Find out how Qualys Vulnerability Management gives you a new approach to continuously secure your IT infrastructure with immediate, global visibility against evolving threats.
Recorded Mar 23 2015 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Eric Perraudeau, Technical Expert, Qualys
Presentation preview: Did You Know? You Can Easily Respond to Constantly Evolving Internet Attacks.

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Take Control of Your Digital Certificates Globally May 17 2018 5:00 pm UTC 60 mins
    Asif Karel, Director of Product Management, Certificate Management, Qualys Inc.
    Take Control of Your Digital Certificates Globally: Assess and Monitor Their Security Implementation

    Effective certificate management is critical for every organization, especially to prevent risk of breaches and unplanned outages. Having complete visibility into certificates, underlying SSL/TLS configurations and Certificate Authority policies, enable organizations to continuously and effectively protect their digital assets.

    Join Asif Karel, Director of Product Management for Qualys CertView, to learn how your organization can discover, monitor and create an inventory of certificates.

    You will understand how to:
    * Create a full inventory of certificates across the enterprise
    * Prevent expired or expiring certificates from causing disruptions in business critical systems
    * Get full visibility of TLS configurations in your enterprise
    * Get SSL Labs like grades for each certificate
    * Detect specific vulnerabilities (such as POODLE, ROBOT, etc), risks (weak ciphers/protocols) or compliance issues (PCI, unapproved CAs) through customizable dashboards and searches

    This webcast will also include a live demo and Q&A with the speaker.
  • Gain Visibility and Continuous Security Across All Your Public Clouds May 3 2018 5:00 pm UTC 60 mins
    Hari Srinivasan, Director of Product Management, Qualys Inc.
    As organizations start moving workloads to public clouds, they are encountering new cloud native security threats and compliance challenges as a result of lack of visibility and no clear understanding of shared security responsibility. Issues like leaky storage buckets, misconfigured security groups, and erroneous user policies create new attack surfaces that will lead to the vulnerable and non-compliant workloads.

    Join Hari Srinivasan, Director of Product Management at Qualys, to understand your organization’s shared security responsibility in

    You will learn how to:
    - Get comprehensive inventory and security posture of your public cloud workloads and infrastructure
    - Identify threats native to clouds and standardize cloud environments as per CIS benchmarks and best practices
    - Get insights and prioritize by having cloud instance vulnerabilities and compliance posture within the single interface
    - Automate security into your DevOps pipeline and block threats from entering into your production cloud deployments. public clouds and how to continuously assess and monitor cloud assets and resources.

    This webcast will also include a live demo and Q&A with the speaker.
  • Streamlining Compliance Programs for Operational Security Recorded: Apr 5 2018 52 mins
    Tim White, Director of Product Management, Qualys
    Learn to effectively navigate the security risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation by participating in this Qualys webcast series.

    In this episode, Tim White, Director of Product Management at Qualys, will highlight the latest IT security and compliance challenges and discuss best practices to streamline compliance and risk programs using the Qualys Cloud Platform and its integrated Apps.

    You will learn some best practices on efficient ways to:
    -Assess security configurations of IT systems, wherever they reside
    -Log and track file changes across IT systems globally
    -Help security teams implement the CIS 20 Critical Security Controls
    -Automate collection and reporting of compliance data for both technical and non-technical controls
    -Automate and standardize vendor risk assessment
  • DevSecOps — Practical Steps to Seamlessly Integrate Security Into DevOps Recorded: Mar 29 2018 52 mins
    Chris Carlson, VP Product Management, Qualys
    Learn to effectively navigate the security risks, new regulations, and new technologies on your journey to a secure and compliant digital transformation by participating in this Qualys webcast series.

    In this webcast, Chris Carlson, Vice President of Product Management at Qualys, will discuss digital transformation trends and how the use of new IT methodologies and technologies like DevOps, Agile development, elastic cloud computing, and containers are changing the security development life cycle.

    You will learn practical steps to seamlessly integrate security into your DevOps environments with best practices and use cases to help you:

    * Understand how digital transformation and the race to the cloud is impacting the security status quo
    * Identify how your existing security tools can be integrated seamlessly into DevOps pipelines using automation and orchestration
    * Create a metric-driven security program that reduces vulnerabilities without slowing down application development lifecycles
    * Learn how you can apply best practices and quick wins from this webcast to create a foundational program at your organization
  • Continuous Web Security Assessment for Production and DevOps Environments Recorded: Mar 15 2018 58 mins
    Dave Ferguson, Director of Product Management, Qualys
    Learn how to ensure web application security, from development to deployment and beyond.
  • Prioritization of Vulnerabilities in a Modern IT Environment Recorded: Mar 14 2018 59 mins
    Josh Zelonis and Jimmy Graham
    The combination of today’s fast changing IT environments, increasingly common “headline” vulnerabilities and swift weaponizing of exploits requires a more automated, continuous and precise approach. Defense methods such as IT asset inventory, vulnerability management, threat prioritization, and patch deployment all must adapt with new speed and scale to deliver continuous visibility of global IT assets and environments for the realities facing today’s digital business.

    Join Qualys along with featured guest speaker Josh Zelonis, Senior Analyst at Forrester, to discuss the practical realities of prioritization in the era of digital transformation, industrious attackers and headline vulnerability disclosures. How can security teams sort through thousands or millions of vulnerabilities in time to prioritize a subset of those, act appropriately, then report up the chain?

    By attending this webcast, you will understand:

    • What this new era of branded vulnerabilities and rapid exploitation means for IT security teams already faced with increased scale and sprawl of cloud, hybrid, on-premises and containerized environments
    • How teams can streamline capabilities in order to simplify security with fewer staff resources
    • How to unify your approach to asset inventory, vulnerability management threat intelligence as vulnerability risk management
    • Why continuous visibility across global IT assets and environments is essential for automating security
  • Securing the Container and Cloud DevOps Pipeline Recorded: Mar 1 2018 53 mins
    Hari Srinivasan, Director of Product Management, Qualys
    See a live demonstration of Qualys Container Security, the industry-leading solution for addressing security of containers in DevOps pipelines and deployments across cloud and on-premises environments.
  • The GDPR Deadline Readiness and Impact to Global Organizations Outside the EU Recorded: Feb 15 2018 46 mins
    Tim White, Director of Product Management, Qualys
    Learn how Qualys helps customers worldwide comply with the European Union General Data Protection Regulation (GDPR).
  • Securing IT Assets by Prioritizing Protection and Remediation Recorded: Feb 1 2018 31 mins
    Jimmy Graham, Director of Product Management, Qualys
    See live demonstrations of Qualys Vulnerability Management, Asset Inventory, Threat Protection, and soon-to-be-released Patch Management.
  • Continuous Security and Compliance Monitoring for Global IT Assets Recorded: Jan 18 2018 45 mins
    Chris Carlson, VP Product Management, Qualys
    Learn how enterprises can achieve immediate visibility across on-premises, endpoint, and cloud IT environments with Qualys Cloud Platform and its powerful, natively integrated security and compliance applications.
  • Avoid Meltdown from the Spectre Recorded: Jan 17 2018 58 mins
    Jimmy Graham, Director of Product Management, Qualys
    The recently disclosed Meltdown and Spectre vulnerabilities negatively impact the security of virtually every computer in the world today. These vulnerabilities allow an attacker to gain control of a computer’s processor and steal data located on that computer. Organizations that store data in the cloud are particularly susceptible.

    During this webcast, Jimmy Graham, Director of Product Management for Qualys Threat Protection and Asset Inventory, will showcase solutions that can help you determine the impact of Spectre and Meltdown across your global IT environments.

    By attending this webcast, you will understand how:
    • To quickly and easily visualize Spectre and Meltdown vulnerabilities within your environment
    • To track remediation progress as you patch against Spectre and Meltdown
    • The Qualys Asset Inventory and Threat Protection apps, which will help you automate detection and track remediation progress
    The webcast will include a live Q&A session.
  • Automating Critical Security Controls for Threat Remediation and Compliance Recorded: Sep 28 2017 57 mins
    John Pescatore and Tim White
    Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenges.

    The Center for Internet Security’s (CIS) Critical Security Controls (CSCs) were selected and prioritized by leading security experts to stop today’s most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and network infrastructure.

    In this webcast, SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance (PC), will discuss how you can achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs.

    The presentation will encompass:

    • An overview of the CIS Critical Security Controls, including ongoing updates
    • Success patterns organizations have demonstrated for using the controls to their advantage
    • How an automation can reduce the staffing load to determine whether controls are in place and effective
    • How to prioritize remediation efforts
    • Real-world examples of recent attacks that leveraged misconfigured systems

    This webcast will include a demo and Q&A session with the speakers.
  • Securing Your Public Cloud Infrastructure Recorded: Jul 20 2017 54 mins
    Mark Butler Chief Information Security Officer, Qualys and Hari Srinivasan Director, Product Management, Cloud and Virtualiza
    Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications.

    In this webcast, Mark Butler, Chief Information Security Officer at Qualys, and Hari Srinivasan, Director of Product Management for Qualys Cloud and Virtualization Security will detail how you can gain complete visibility of your organization’s entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure.

    The presentation will cover:

    > Challenges surrounding increased migration to public clouds
    > Using automation for secure DevOps
    > How to ensure effective and efficient operations

    This webcast will include a Q&A session, as well as a live demonstration of how to deploy Qualys seamlessly and deeply into public cloud environments with new features.
  • Streamlining Third Party Risk Assessments in the Cloud Recorded: Jun 20 2017 59 mins
    Jonathan Osmolski, Enterprise Records & Information Governance, Pekin Insurance & Hariom Singh, Product Management Qualys
    Security assessments drastically reduce your organization’s risk of suffering a data breach by identifying poor InfoSec and privacy practices among vendors, partners, contractors, and other third parties.

    For most businesses, these assessments are a slow, unscalable, manual process that strains InfoSec teams and creates a backlog of security evaluations.

    During this webcast, Jonathan Osmolski, Manager of Enterprise Records and Information Governance at Pekin Insurance, and Hariom Singh, Director of Product Management for Qualys Security Assessment Questionnaire (SAQ) will show you how you can free your organization from unreliable and labor-intensive manual processes, and optimize the accuracy of audit results.

    You will learn how Pekin Insurance:

    > Replicated its manual 76-question assessment process within SAQ’s web-based UI in just two hours
    > Simplified the design, distribution, tracking, and analysis of multiple vendor risk assessment campaigns
    > Gained improved visibility into its compliance performance metrics
    Increased the overall productivity and efficiency of its InfoSec team

    This webcast will include a live demo and Q&A session.
  • Visualize Your Threat Exposure to WannaCry & Shadow Brokers With Dashboards Recorded: Jun 1 2017 50 mins
    Jimmy Graham, Director of Product Management, Qualys
    The WannaCry ransomware virus has wreaked havoc on hundreds of thousands of computers around the world since the outbreak began on May 12. This virus exploits vulnerabilities in Microsoft Windows XP and 2003, encrypting files and demanding that users pay a ransom to regain access. Determining whether the vulnerability exists within your global IT environment can be a daunting task, and existing enterprise security solutions are slow to deploy.

    Jimmy Graham, Director of Product Management for ThreatPROTECT at Qualys, will demonstrate how you can:

    • Identify, track, and remediate assets susceptible to critical vulnerabilities, including WannaCry and the recent Samba exploit
    • Create dashboards and reports to visualize the impact of assets in real time and track your remediation efforts
    • Institute threat-prioritized remediation processes to mitigate current and future risks

    This webcast will include a Q&A session with the speaker.
  • Countdown to GDPR - Reduce your Risk Recorded: May 24 2017 60 mins
    Darron Gibbard, Managing Director, EMEA North at Qualys & Jonathan Armstrong, Partner at Cordery
    This is a must-attend webcast for anyone working for an organisation within Europe and responsible for the security of personal data.

    You are probably already thinking about the EU General Data Protection Regulation (GDPR) and the huge potential fines of €20m or 4% of annual worldwide turnover.

    For organisations headquartered across EMEA, GDPR is a key focus for the next 12 months as the 25 May 2018 deadline approaches. Qualys solutions can help your organisation prepare and comply with GDPR.

    During this webcast, Jonathan Armstrong, Compliance and Technology Lawyer, Partner at Cordery, will answer any compliance questions and highlight the key areas to consider. Darron Gibbard, Managing Director, EMEA North at Qualys, will show you how to know and control your data, assets and suppliers.

    You will get practical advice on:

    - What you need to focus on: data, assets, suppliers
    - Who you should involve: key stakeholders and departments
    - How you can automate processes with Qualys Security Assessment Questionnaire

    This webcast will include a live Q&A session.
  • Spot & Patch Web App Bugs in One Click Recorded: May 23 2017 57 mins
    Vikas Phonsa, Product Management, Qualys WAF and Frank Catucci, Product Management, Qualys WAS
    Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security.

    Qualys simplifies web app security with an end-to-end solution.

    During this webcast, presenters Vikas Phonsa and Frank Catucci will show you how you can:

    * Scan your apps using Qualys Web Application Scanning (WAS)
    * Deploy one-click virtual patches for detected vulnerabilities in Qualys Web Application Firewall (WAF)
    * Manage it all from a centralized, cloud-based portal

    This webcast will include a live Q&A session.
  • How to Rapidly Identify Assets at Risk to WannaCry Ransomware Recorded: May 17 2017 77 mins
    Jimmy Graham, Director of Product Management, Qualys and Mark Butler, Chief Information Security Officer, Qualys
    A major ransomware attack using a leaked NSA exploit known as “WannaCry” has hit more than 150 countries since May 12. More than 200,000 infections globally have been detected and the attack, which uses the WannaCry (WanaCrypt0r 2.0) ransomware, continues to spread.

    WannaCry utilizes the ETERNALBLUE exploit targeting newly disclosed vulnerabilities (MS17-010). Once leaked, it took only 28 days for this exploit to be used in a full-scale cyber attack. Organizations that scan for vulnerabilities only monthly or less frequently can still be at risk.

    During this webcast Jimmy Graham, Director of Product Management at Qualys, and Mark Butler, Chief Information Security Officer at Qualys, will discuss how to:

    • Patch and implement other mitigations for WannaCry
    • Detect and get full visibility on impacted assets for prompt remediation
    • Institute threat-prioritized remediation processes to mitigate current and future risks

    This webcast will include a live Q&A session.
  • Gain Visibility & Control of IT Assets in a Perimeterless World Recorded: May 4 2017 45 mins
    Jimmy Graham, Director, Product Management, AssetView and Darron Gibbard, Chief Technical Security Officer EMEA, Qualys
    In today’s perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks.

    The IT assets that pose the greatest risk to your organization’s security are the ones you don’t know are there. Lack of visibility into your IT environment undermines the foundations of your enterprise security and compliance infrastructure and puts your organization at serious risk of a breach. Without knowledge of which software and devices exist in your network — whether on-premises, on endpoints, or in elastic clouds — InfoSec professionals are unable to enact proper security and protection.

    During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA will cover the six key elements of an ideal cloud-based IT asset inventory system:

    1. Complete visibility of your IT environment
    2. Deep visibility into assets
    3. Continuous and automatic updates
    4. Asset criticality ranking
    5. Interactive, customizable dashboarding and reporting
    6. Integration with your CMDB


    Those of you in the EU will also be interested to learn about asset inventory for GDPR compliance.

    This webcast will include a live Q&A session.
  • Automated Compliance Assessment for RBI Cyber Security Guidelines Recorded: May 3 2017 56 mins
    Shailesh Athalye, Senior Manager, Compliance Research & Analysis, Qualys
    Perimeterless IT infrastructure and its security is now an integral part of the operational strategies of India’s financial institutions. But the number, frequency, and impact of cyber attacks on Indian financial institutions have increased substantially, underlining the urgent need for banks to develop robust cyber security measures, and assess their security posture on a continuous basis.

    The RBI Guidelines for Cyber Security assist financial institutions to achieve this through a new-era preventative security baseline.

    During this webcast, Shailesh Athalye, Qualys Senior Manager, Compliance Research and Analysis, will discuss how financial institutions can easily address both the technical & procedural elements of the RBI Guidelines for Cyber Security in an automated manner using the highly scalable Qualys Cloud Platform.

    This webcast will include a live Q&A session.
IT Security Best Practices and Resources
Join us for this informative technology series for insights into emerging security trends that every IT professional should know. These brief sessions will give you an opportunity to discover best practices from market leaders as well as hands-on advice from industry experts on a variety of security and compliance topics.

Let Qualys help keep you up-to-date with cost-effective and efficient technology trends. Choose the topic that interests you or plan to attend the entire series to make sure you stay ahead of the curve.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Did You Know? You Can Easily Respond to Constantly Evolving Internet Attacks.
  • Live at: Mar 23 2015 5:00 pm
  • Presented by: Eric Perraudeau, Technical Expert, Qualys
  • From:
Your email has been sent.
or close