Hi [[ session.user.profile.firstName ]]

Vulnerability Detection in Today's Mobile Workforce

As a security professional, getting to know your current vulnerability data from your mobile workforce is a difficult task. If the mobile devices are not on the network at the time of your scan, or if you do not schedule a scan for the devices specifically, your data could become out of date by weeks or even months.

During this webcast, Corey Reed from Synovus Bank and Wolfgang Kandek from Qualys will discuss how Qualys Cloud Agent has helped Synovus Bank to:

* Perform frequent vulnerability scans for all internal and external assets.

* Receive faster notification and remediation for zero day and critical threats.

* Improve their vulnerability analysis and security patching programs by providing data that can be used to prioritize patch distribution.
Recorded May 17 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Corey Reed, Sr. Information Security Analyst, Synovus Bank and Wolfgang Kandek, CTO, Qualys
Presentation preview: Vulnerability Detection in Today's Mobile Workforce

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Securing Your Web Apps in Today's Complex Cloud Environment Recorded: Nov 1 2016 58 mins
    Alex Jones, Security Engineer, Gainsight & Dave Ferguson, Solution Architect, Qualys
    Today, securing web applications has become more complex as organizations increasingly deploy and manage their web applications in the cloud. Modern web technologies such as sophisticated JavaScript frameworks and SPAs present increasing challenges to web application scanning, as crawling has become more difficult to manage.

    During this webcast Alex Jones from Gainsight and Dave Ferguson from Qualys will discuss how Qualys has helped Gainsight to:

    - Scan, discover, catalog applications on multiple cloud environments for vulnerabilities and website misconfigurations.

    - Adapt to increasingly complex and new web application technologies.

    - Build an easy-to-use, accurate and scalable scanning program across web application and network infrastructure.
  • Overcome Outdated Processes and Automate IT Risk & Compliance Recorded: Oct 6 2016 58 mins
    Nick Hayes, Analyst at Forrester, Josh Hankins, Information Security Solutions Manager at 84.51°
    Companies across a wide gamut of industries and regions all strive to effectively manage risk and compliance, but too few actually achieve it. As IT, business, and regulatory environments grow increasingly complex, risk and compliance pros must move past outdated processes and legacy systems to innovate and find ways to achieve higher degrees of efficiency and oversight.

    During this webcast, guest speakers Nick Hayes, Analyst at Forrester, and Josh Hankins, Information Security Solutions Manager at 84.51° will cover how you can:

    · Move up the maturity curve through better program coordination and technology integration.
    · Establish the right metrics to build the business case and showcase continual progress.
    · Bolster future success by prioritizing business agility and data mastery as top strategic objectives.

    This Webcast will have a Live Q&A
  • Excel at Your Security Assessments Without EXCEL Spreadsheets Recorded: Sep 13 2016 61 mins
    Tim White, Director of Product Management, Qualys and Hariom Singh, Subject Matter Expert, Qualys
    Third-parties, partners and vendors with access to your networks and data make your organization vulnerable to breaches. Clearly, your business needs to work with third parties, but you don’t want your company to fall victim to data theft, brand damage, and possible government fines as a result, so you have to take third-party and vendor assessment very seriously.

    With Qualys Security Assessment Questionnaire (SAQ) you can expand the scope of risk and compliance data beyond technical vulnerabilities to verify that third-party vendors are in compliance with emerging regulatory requirements. By automating a traditionally manual process, Qualys SAQ frees you from unreliable and labor-intensive approaches such as email and spreadsheets.

    Join our complimentary webcast to learn how Qualys SAQ can help with:

    * Third-Party risk assessment
    * Internal Audit Management
    * Security Training and Awareness
    * End-to-End security compliance

    This webcast includes a live demo and a Q&A.
  • Improving on "Whack-a-Mole" Vulnerability Management Recorded: Aug 18 2016 50 mins
    Joseph Blankenship Senior Analyst, Forrester & Jimmy Graham Director, Product Management, Qualys
    The need to prioritize vulnerability management (VM) is greater than ever as IT security teams become overwhelmed with trying to protect against every threat that pops up. Organizations that understand the varying risks across vulnerabilities can focus on resolving dangerous exploitation, and avoid wasting crucial time addressing insignificant ones.

    We invite you to attend the “Improving on 'Whack-a-Mole' Vulnerability Management” webcast featuring guest speaker Joseph Blankenship, Senior Analyst at Forrester, and Jimmy Graham, Director of Product Management at Qualys.

    The following topics will be discussed during the webcast:

    * Forrester data trends and insights from real-world client scenarios

    * Why vulnerability management needs to be prioritized and elevated

    * How Qualys ThreatPROTECT shows you what to remediate first (led by Qualys)


    This webcast includes a live Q&A.
  • Prioritize and Remediate your Vulnerabilities with Qualys ThreatPROTECT Recorded: Jun 23 2016 61 mins
    Wolfgang Kandek, CTO, Qualys and Tim White Director, Product Management, Qualys
    Dealing with a large number of IT vulnerabilities is an issue for most organizations. Only 10 Common Vulnerabilities and Exposures (CVEs) account for 97% of the exploits*. Clearly, it is vital for you to identify which of your vulnerabilities are the most critical to address first with fast, effective remediation.

    Qualys’ newest solution ThreatPROTECT correlates vulnerability data with a Live Threat Intelligence Feed from multiple industry sources, providing customers with an easy-to-understand dashboard that provides clear insight into which vulnerabilities to fix first.

    During this webcast presenters Wolfgang Kandek, and Tim White, will show you how you can use ThreatPROTECT to:

    * Quickly identify your most important assets and critical vulnerabilities

    * Prioritize remediation efforts so you know which vulnerabilities to tackle first

    * Eliminate the guesswork with real-time correlation of active threats

    This webcast includes a live demo and a Q&A.
  • Vulnerability Detection in Today's Mobile Workforce Recorded: May 17 2016 60 mins
    Corey Reed, Sr. Information Security Analyst, Synovus Bank and Wolfgang Kandek, CTO, Qualys
    As a security professional, getting to know your current vulnerability data from your mobile workforce is a difficult task. If the mobile devices are not on the network at the time of your scan, or if you do not schedule a scan for the devices specifically, your data could become out of date by weeks or even months.

    During this webcast, Corey Reed from Synovus Bank and Wolfgang Kandek from Qualys will discuss how Qualys Cloud Agent has helped Synovus Bank to:

    * Perform frequent vulnerability scans for all internal and external assets.

    * Receive faster notification and remediation for zero day and critical threats.

    * Improve their vulnerability analysis and security patching programs by providing data that can be used to prioritize patch distribution.
  • Detect All Your IT Assets in SECONDS Recorded: Apr 5 2016 59 mins
    Wolfgang Kandek, CTO, Qualys
    The foundation of security is control. But how do you control what you can't search?

    A huge hurdle to protecting your network is knowing exactly what devices are connected. It’s increasingly difficult for organizations to know what IT assets exist in their environment, where they’re located, who manages them and their associated security risks.

    Learn how Qualys AssetView quickly gives your IT and security teams a complete, accurate view of all IT assets in your environment via your favorite web browser.

    Reserve your seat for this webcast so you can discover how to:

    * Run instant queries that return results in seconds
    * Search for OS and App configuration information on all your assets for fast, accurate and actionable data
    * Get a unified view of your IT and Security data
  • Visibility and Actionable Data Across Millions of IT Assets in Seconds Recorded: Feb 23 2016 59 mins
    Wolfgang Kandek, CTO, Qualys and Tim White, Director of Product Management, Qualys
    Knowing what IT assets you have and how to protect them is increasingly a challenge as globalization, virtualization and mobile assets create new endpoints and new opportunities for hackers to infiltrate. Now you can move beyond traditional scanner-based approaches to strengthen endpoint security with a free solution from Qualys.

    Discover how the Qualys AssetView gives you a fast, actionable view of all IT assets while helping to:

    > Gain comprehensive, scalable and always up-to-date view of endpoints — with continuously updated inventory of asset details, scaling to millions of assets

    > Deliver fast, accurate and actionable data — with a new layer of intelligence into the current state of endpoints, including details about services, file systems and registries as well as information to manage and secure systems

    > Minimize impact on systems and networks — by keeping itself lightweight and up-to-date to eliminate the need to reboot

    > Handle virtualized environments with ease — by keeping track of the constant proliferation of images inside and outside of the environment
  • Mastering Vulnerability Management with A Risk-based Approach Recorded: Jan 27 2016 63 mins
    John Haberland Dir. Strategic Alliances, Qualys and Syed Abdur Rahman Sr. Product Manager, Brinqa
    To effectively prioritize and remediate the most critical vulnerabilities threatening your organization, you need to combine internal asset risk evaluation with external real-time exploit and threat intelligence to create the most accurate picture of incidence and impact.

    Join this webcast to learn how Qualys and Brinqa provide all the tools you need to dramatically improve the effectiveness and performance of your vulnerability management program, including :

    * Leveraging asset risk and context during vulnerability prioritization

    * Effective remediation through automated, risk-centric remediation policies

    * Business risk and exposure reporting for primary stakeholders
  • Cloud Without Borders - High-confidence, Secure Computing: Anytime & Anywhere Recorded: Jan 20 2016 59 mins
    Wolfgang Kandek, CTO, Qualys
    Powerful technologies from the core to the edge are enabling new insights and transforming value creation. But these opportunities create new risks and urgently beg for innovative approaches to securing our most precious information. Learn how a new architecture of cloud security expertise, endpoints and apps will enable high-confidence computing and deliver security and privacy anywhere, anytime.
  • Mastering Vulnerability Management with A Risk-based Approach Recorded: Dec 15 2015 63 mins
    John Haberland Dir. Strategic Alliances, Qualys and Syed Abdur Rahman Sr. Product Manager, Brinqa
    To effectively prioritize and remediate the most critical vulnerabilities threatening your organization, you need to combine internal asset risk evaluation with external real-time exploit and threat intelligence to create the most accurate picture of incidence and impact.

    Join this webcast to learn how Qualys and Brinqa provide all the tools you need to dramatically improve the effectiveness and performance of your vulnerability management program, including :

    * Leveraging asset risk and context during vulnerability prioritization

    * Effective remediation through automated, risk-centric remediation policies

    * Business risk and exposure reporting for primary stakeholders
  • The ABCs of The Pragmatic CISO: Assets, Borderless-ness and Compliance Recorded: Dec 10 2015 60 mins
    Wolfgang Kandek, CTO, Qualys and Mike Rothman, Analyst & President, Securosis
    With cyber security taking the front seat in the boardroom, CISOs now have more visibility than ever before. But, many are struggling to gain the visibility they need to be effective and searching for practical techniques to gain full control over their assets for continuous security and compliance.

    Join this webcast where we'll cover the ABCs of being a pragmatic CISO.

    * Assets — discover, assess, categorize, and secure assets across clouds and networks

    * Borderless-ness — apply controls that remain effective across borders (e.g. on the endpoint)

    * Compliance — achieve continuous and demonstrable compliance with PCI, HIPAA, NIST, and more
  • A New Level of Visibility And Certainty for Security Professionals Recorded: Oct 29 2015 56 mins
    Wolfgang Kandek, CTO, Qualys and Tim White, Director of Product Management, Qualys
    Do you want to be able to answer questions like these quickly and with confidence?

    * Which of your vulnerabilities are actively being exploited?
    * What unauthorized software is installed on your assets?

    Join this webcast to discover how you can get a new level of visibility and certainty using a free asset inventory product from Qualys.
  • Integrated web app security delivered via the cloud Recorded: Oct 16 2015 54 mins
    Koen Vanderpoorten, Technical Account Manager, Qualys
    To prevent attack requires a multi-layered solution that addresses one of the most vulnerable parts of your IT environment. Join us for this webcast to learn how Qualys Web Application Scanning (WAS) and Qualys Web Application Firewall (WAF) work together to provide your organization true, integrated protection.
  • Top Takeaways for National Cyber Security Awareness Month Recorded: Oct 13 2015 56 mins
    Mike Rothman, Analyst & President, Securosis and Wolfgang Kandek, CTO, Qualys
    In this 30-minute webcast, industry experts Mike Rothman, President of Securosis Research and Wolfgang Kandek, CTO of Qualys will share their top recommendations for making the most of National Cyber Security Awareness Month. With data breaches in the headlines of nearly every online magazine, it’s never been a better time to maximize cyber security awareness and translate it into pragmatic results for the enterprise.

    During this webcast, attendees will learn
    :
    * Which tactics have the greatest effect on fostering cyber security awareness throughout the enterprise

    * How to foster a risk-aware security culture while still encouraging trust among your employees and partners

    * How to bridge the gap between IT security and IT operations (hint: knowing more about your assets is the first step)
  • Prevent attack with comprehensive vulnerability management Recorded: Oct 2 2015 57 mins
    Koen Vanderpoorten, Technical Account Manager, Qualys
    Now you can get continuous, automated detection and protection against any vulnerability, anytime, with the next generation of Qualys Vulnerability Management (VM). Join us for this webcast to watch a live demonstration of the comprehensive VM solution from Qualys.
  • Applying Actionable Threat Intelligence to your Vulnerability Management Program Recorded: Sep 24 2015 36 mins
    Damian O'Hara from Qualys, David French from Kenna Security
    This live webinar will showcase how Qualys and Kenna together connect an organisation’s vulnerability scanning program with actionable threat intelligence to employ a risk-based approach to vulnerability management. Attendees will learn strategies for applying actionable threat intelligence to their vulnerability management programs.
  • Applying Actionable Threat Intelligence to Your Vulnerability Management Program Recorded: Sep 17 2015 48 mins
    Wolfgang Kandek, CTO, Qualys and David French, VP of Sales & Business Development, Kenna Security, Inc.
    This live webinar will showcase how Qualys and Kenna together connect an organization’s vulnerability scanning program with actionable threat intelligence to employ a risk-based approach to vulnerability management. Learn how companies are driving down their exposure to vulnerabilities that match active Internet breaches, and track remediation progress with little manual effort and without adding additional headcount.
  • Addressing Web Application Vulnerability with Integrated, Continuous Protection Recorded: Sep 15 2015 60 mins
    Frank Catucci, Director of Web Application Security, Qualys and Steve McBride, Director of Web Application Security, Qualys
    Learn how Qualys can help you implement web application security throughout your systems development lifecycle (SDLC), so you can:

    > Perform comprehensive, accurate scans — across all of development and deployment stages

    > Block attacks — and control where and when your applications are accessed

    > Prevent data breaches — and disclosure of sensitive information
  • Setup for Success with Qualys Express Part 3: Web Application Scanning Recorded: Aug 20 2015 28 mins
    Calvin Lam, Technical Account Manager, Qualys
    In this webcast, we will look into some easy steps you could take to run vulnerability scans against web applications. We will show you step-by-step how to configure Qualys Web Application Scanning, execute discovery and vulnerability scans, as well as run reports and create a strategy for remediation.
IT Security Best Practices and Resources
Join us for this informative technology series for insights into emerging security trends that every IT professional should know. These brief sessions will give you an opportunity to discover best practices from market leaders as well as hands-on advice from industry experts on a variety of security and compliance topics.

Let Qualys help keep you up-to-date with cost-effective and efficient technology trends. Choose the topic that interests you or plan to attend the entire series to make sure you stay ahead of the curve.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Vulnerability Detection in Today's Mobile Workforce
  • Live at: May 17 2016 6:00 pm
  • Presented by: Corey Reed, Sr. Information Security Analyst, Synovus Bank and Wolfgang Kandek, CTO, Qualys
  • From:
Your email has been sent.
or close