Hi [[ session.user.profile.firstName ]]

Excel at Your Security Assessments Without EXCEL Spreadsheets

Third-parties, partners and vendors with access to your networks and data make your organization vulnerable to breaches. Clearly, your business needs to work with third parties, but you don’t want your company to fall victim to data theft, brand damage, and possible government fines as a result, so you have to take third-party and vendor assessment very seriously.

With Qualys Security Assessment Questionnaire (SAQ) you can expand the scope of risk and compliance data beyond technical vulnerabilities to verify that third-party vendors are in compliance with emerging regulatory requirements. By automating a traditionally manual process, Qualys SAQ frees you from unreliable and labor-intensive approaches such as email and spreadsheets.

Join our complimentary webcast to learn how Qualys SAQ can help with:

* Third-Party risk assessment
* Internal Audit Management
* Security Training and Awareness
* End-to-End security compliance

This webcast includes a live demo and a Q&A.
Recorded Sep 13 2016 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tim White, Director of Product Management, Qualys and Hariom Singh, Subject Matter Expert, Qualys
Presentation preview: Excel at Your Security Assessments Without EXCEL Spreadsheets

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • What to See at RSAC 2018 — Get the Most Out of Your Attendance Apr 12 2018 5:00 pm UTC 30 mins
    Chris Carlson, VP Product Management, Qualys
    Get a preview of what's coming up at RSAC 2018 in San Francisco.
  • Supercharging Compliance Programs for Operational Security Apr 5 2018 5:00 pm UTC 30 mins
    Tim White, Director of Product Management, Qualys
    Learn how to take your regulatory compliance to the next level with Qualys Cloud Platform.
  • DevSecOps — Practical Steps to Seamlessly Integrate Security Into DevOps Mar 29 2018 5:00 pm UTC 30 mins
    Chris Carlson, VP Product Management, Qualys
    Learn how Qualys can ensure security and compliance in your software development,
  • Continuous Web Security Assessment for Production and DevOps Environments Mar 15 2018 5:00 pm UTC 30 mins
    Dave Ferguson, Director of Product Management, Qualys
    Learn how to ensure web application security, from development to deployment and beyond.
  • The Practical Realities of Prioritization in a Modern IT Environment Mar 14 2018 5:00 pm UTC 60 mins
    Josh Zelonis and Jimmy Graham
    The combination of today’s fast changing IT environments, increasingly common “headline” vulnerabilities and swift weaponizing of exploits requires a more automated, continuous and precise approach. Defense methods such as IT asset inventory, vulnerability management, threat prioritization, and patch deployment all must adapt with new speed and scale to deliver continuous visibility of global IT assets and environments for the realities facing today’s digital business.

    Join Qualys along with featured guest speaker Josh Zelonis, Senior Analyst at Forrester, to discuss the practical realities of prioritization in the era of digital transformation, industrious attackers and headline vulnerability disclosures. How can security teams sort through thousands or millions of vulnerabilities in time to prioritize a subset of those, act appropriately, then report up the chain?

    By attending this webcast, you will understand:

    • What this new era of branded vulnerabilities and rapid exploitation means for IT security teams already faced with increased scale and sprawl of cloud, hybrid, on-premises and containerized environments
    • How teams can streamline capabilities in order to simplify security with fewer staff resources
    • How to unify your approach to asset inventory, vulnerability management threat intelligence as vulnerability risk management
    • Why continuous visibility across global IT assets and environments is essential for automating security
  • Securing the Container and Cloud DevOps Pipeline Mar 1 2018 6:00 pm UTC 45 mins
    Hari Srinivasan, Director of Product Management, Qualys
    See a live demonstration of Qualys Container Security, the industry-leading solution for addressing security of containers in DevOps pipelines and deployments across cloud and on-premises environments.
  • The GDPR Deadline Readiness and Impact to Global Organizations Outside the EU Recorded: Feb 15 2018 46 mins
    Tim White, Director of Product Management, Qualys
    Learn how Qualys helps customers worldwide comply with the European Union General Data Protection Regulation (GDPR).
  • Securing IT Assets by Prioritizing Protection and Remediation Recorded: Feb 1 2018 31 mins
    Jimmy Graham, Director of Product Management, Qualys
    See live demonstrations of Qualys Vulnerability Management, Asset Inventory, Threat Protection, and soon-to-be-released Patch Management.
  • Continuous Security and Compliance Monitoring for Global IT Assets Recorded: Jan 18 2018 45 mins
    Chris Carlson, VP Product Management, Qualys
    Learn how enterprises can achieve immediate visibility across on-premises, endpoint, and cloud IT environments with Qualys Cloud Platform and its powerful, natively integrated security and compliance applications.
  • Avoid Meltdown from the Spectre Recorded: Jan 17 2018 58 mins
    Jimmy Graham, Director of Product Management, Qualys
    The recently disclosed Meltdown and Spectre vulnerabilities negatively impact the security of virtually every computer in the world today. These vulnerabilities allow an attacker to gain control of a computer’s processor and steal data located on that computer. Organizations that store data in the cloud are particularly susceptible.

    During this webcast, Jimmy Graham, Director of Product Management for Qualys Threat Protection and Asset Inventory, will showcase solutions that can help you determine the impact of Spectre and Meltdown across your global IT environments.

    By attending this webcast, you will understand how:
    • To quickly and easily visualize Spectre and Meltdown vulnerabilities within your environment
    • To track remediation progress as you patch against Spectre and Meltdown
    • The Qualys Asset Inventory and Threat Protection apps, which will help you automate detection and track remediation progress
    The webcast will include a live Q&A session.
  • Automating Critical Security Controls for Threat Remediation and Compliance Recorded: Sep 28 2017 57 mins
    John Pescatore and Tim White
    Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenges.

    The Center for Internet Security’s (CIS) Critical Security Controls (CSCs) were selected and prioritized by leading security experts to stop today’s most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and network infrastructure.

    In this webcast, SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance (PC), will discuss how you can achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs.

    The presentation will encompass:

    • An overview of the CIS Critical Security Controls, including ongoing updates
    • Success patterns organizations have demonstrated for using the controls to their advantage
    • How an automation can reduce the staffing load to determine whether controls are in place and effective
    • How to prioritize remediation efforts
    • Real-world examples of recent attacks that leveraged misconfigured systems

    This webcast will include a demo and Q&A session with the speakers.
  • Securing Your Public Cloud Infrastructure Recorded: Jul 20 2017 54 mins
    Mark Butler Chief Information Security Officer, Qualys and Hari Srinivasan Director, Product Management, Cloud and Virtualiza
    Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications.

    In this webcast, Mark Butler, Chief Information Security Officer at Qualys, and Hari Srinivasan, Director of Product Management for Qualys Cloud and Virtualization Security will detail how you can gain complete visibility of your organization’s entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure.

    The presentation will cover:

    > Challenges surrounding increased migration to public clouds
    > Using automation for secure DevOps
    > How to ensure effective and efficient operations

    This webcast will include a Q&A session, as well as a live demonstration of how to deploy Qualys seamlessly and deeply into public cloud environments with new features.
  • Streamlining Third Party Risk Assessments in the Cloud Recorded: Jun 20 2017 59 mins
    Jonathan Osmolski, Enterprise Records & Information Governance, Pekin Insurance & Hariom Singh, Product Management Qualys
    Security assessments drastically reduce your organization’s risk of suffering a data breach by identifying poor InfoSec and privacy practices among vendors, partners, contractors, and other third parties.

    For most businesses, these assessments are a slow, unscalable, manual process that strains InfoSec teams and creates a backlog of security evaluations.

    During this webcast, Jonathan Osmolski, Manager of Enterprise Records and Information Governance at Pekin Insurance, and Hariom Singh, Director of Product Management for Qualys Security Assessment Questionnaire (SAQ) will show you how you can free your organization from unreliable and labor-intensive manual processes, and optimize the accuracy of audit results.

    You will learn how Pekin Insurance:

    > Replicated its manual 76-question assessment process within SAQ’s web-based UI in just two hours
    > Simplified the design, distribution, tracking, and analysis of multiple vendor risk assessment campaigns
    > Gained improved visibility into its compliance performance metrics
    Increased the overall productivity and efficiency of its InfoSec team

    This webcast will include a live demo and Q&A session.
  • Visualize Your Threat Exposure to WannaCry & Shadow Brokers With Dashboards Recorded: Jun 1 2017 50 mins
    Jimmy Graham, Director of Product Management, Qualys
    The WannaCry ransomware virus has wreaked havoc on hundreds of thousands of computers around the world since the outbreak began on May 12. This virus exploits vulnerabilities in Microsoft Windows XP and 2003, encrypting files and demanding that users pay a ransom to regain access. Determining whether the vulnerability exists within your global IT environment can be a daunting task, and existing enterprise security solutions are slow to deploy.

    Jimmy Graham, Director of Product Management for ThreatPROTECT at Qualys, will demonstrate how you can:

    • Identify, track, and remediate assets susceptible to critical vulnerabilities, including WannaCry and the recent Samba exploit
    • Create dashboards and reports to visualize the impact of assets in real time and track your remediation efforts
    • Institute threat-prioritized remediation processes to mitigate current and future risks

    This webcast will include a Q&A session with the speaker.
  • Countdown to GDPR - Reduce your Risk Recorded: May 24 2017 60 mins
    Darron Gibbard, Managing Director, EMEA North at Qualys & Jonathan Armstrong, Partner at Cordery
    This is a must-attend webcast for anyone working for an organisation within Europe and responsible for the security of personal data.

    You are probably already thinking about the EU General Data Protection Regulation (GDPR) and the huge potential fines of €20m or 4% of annual worldwide turnover.

    For organisations headquartered across EMEA, GDPR is a key focus for the next 12 months as the 25 May 2018 deadline approaches. Qualys solutions can help your organisation prepare and comply with GDPR.

    During this webcast, Jonathan Armstrong, Compliance and Technology Lawyer, Partner at Cordery, will answer any compliance questions and highlight the key areas to consider. Darron Gibbard, Managing Director, EMEA North at Qualys, will show you how to know and control your data, assets and suppliers.

    You will get practical advice on:

    - What you need to focus on: data, assets, suppliers
    - Who you should involve: key stakeholders and departments
    - How you can automate processes with Qualys Security Assessment Questionnaire

    This webcast will include a live Q&A session.
  • Spot & Patch Web App Bugs in One Click Recorded: May 23 2017 57 mins
    Vikas Phonsa, Product Management, Qualys WAF and Frank Catucci, Product Management, Qualys WAS
    Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security.

    Qualys simplifies web app security with an end-to-end solution.

    During this webcast, presenters Vikas Phonsa and Frank Catucci will show you how you can:

    * Scan your apps using Qualys Web Application Scanning (WAS)
    * Deploy one-click virtual patches for detected vulnerabilities in Qualys Web Application Firewall (WAF)
    * Manage it all from a centralized, cloud-based portal

    This webcast will include a live Q&A session.
  • How to Rapidly Identify Assets at Risk to WannaCry Ransomware Recorded: May 17 2017 77 mins
    Jimmy Graham, Director of Product Management, Qualys and Mark Butler, Chief Information Security Officer, Qualys
    A major ransomware attack using a leaked NSA exploit known as “WannaCry” has hit more than 150 countries since May 12. More than 200,000 infections globally have been detected and the attack, which uses the WannaCry (WanaCrypt0r 2.0) ransomware, continues to spread.

    WannaCry utilizes the ETERNALBLUE exploit targeting newly disclosed vulnerabilities (MS17-010). Once leaked, it took only 28 days for this exploit to be used in a full-scale cyber attack. Organizations that scan for vulnerabilities only monthly or less frequently can still be at risk.

    During this webcast Jimmy Graham, Director of Product Management at Qualys, and Mark Butler, Chief Information Security Officer at Qualys, will discuss how to:

    • Patch and implement other mitigations for WannaCry
    • Detect and get full visibility on impacted assets for prompt remediation
    • Institute threat-prioritized remediation processes to mitigate current and future risks

    This webcast will include a live Q&A session.
  • Gain Visibility & Control of IT Assets in a Perimeterless World Recorded: May 4 2017 45 mins
    Jimmy Graham, Director, Product Management, AssetView and Darron Gibbard, Chief Technical Security Officer EMEA, Qualys
    In today’s perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks.

    The IT assets that pose the greatest risk to your organization’s security are the ones you don’t know are there. Lack of visibility into your IT environment undermines the foundations of your enterprise security and compliance infrastructure and puts your organization at serious risk of a breach. Without knowledge of which software and devices exist in your network — whether on-premises, on endpoints, or in elastic clouds — InfoSec professionals are unable to enact proper security and protection.

    During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA will cover the six key elements of an ideal cloud-based IT asset inventory system:

    1. Complete visibility of your IT environment
    2. Deep visibility into assets
    3. Continuous and automatic updates
    4. Asset criticality ranking
    5. Interactive, customizable dashboarding and reporting
    6. Integration with your CMDB


    Those of you in the EU will also be interested to learn about asset inventory for GDPR compliance.

    This webcast will include a live Q&A session.
  • Automated Compliance Assessment for RBI Cyber Security Guidelines Recorded: May 3 2017 56 mins
    Shailesh Athalye, Senior Manager, Compliance Research & Analysis, Qualys
    Perimeterless IT infrastructure and its security is now an integral part of the operational strategies of India’s financial institutions. But the number, frequency, and impact of cyber attacks on Indian financial institutions have increased substantially, underlining the urgent need for banks to develop robust cyber security measures, and assess their security posture on a continuous basis.

    The RBI Guidelines for Cyber Security assist financial institutions to achieve this through a new-era preventative security baseline.

    During this webcast, Shailesh Athalye, Qualys Senior Manager, Compliance Research and Analysis, will discuss how financial institutions can easily address both the technical & procedural elements of the RBI Guidelines for Cyber Security in an automated manner using the highly scalable Qualys Cloud Platform.

    This webcast will include a live Q&A session.
  • Detect and Block Apache Struts Bug Across Your Enterprise Recorded: Mar 22 2017 62 mins
    Vikas Phonsa Director Product Management Web App Firewall and Frank Catucci Director Product Management Web App Scanning
    A critical vulnerability has been found in Apache Struts 2, and it is being actively attacked in the wild, as hackers jump at the chance to hit high-profile targets by exploiting this critical bug.

    Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise.

    During this webcast, Qualys Product Management Directors Vikas Phonsa (Web Application Firewall) and Frank Catucci (Web Application Scanning) will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.

    With Qualys Vulnerability Management, Web Application Scanning, and Web Application Firewall, you can find Struts in your environment quickly, comprehensively, and at scale, as well as shield your organization from Struts attacks while you identify and patch vulnerable systems.

    This webcast will include a live demo and Q&A session.
IT Security Best Practices and Resources
Join us for this informative technology series for insights into emerging security trends that every IT professional should know. These brief sessions will give you an opportunity to discover best practices from market leaders as well as hands-on advice from industry experts on a variety of security and compliance topics.

Let Qualys help keep you up-to-date with cost-effective and efficient technology trends. Choose the topic that interests you or plan to attend the entire series to make sure you stay ahead of the curve.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Excel at Your Security Assessments Without EXCEL Spreadsheets
  • Live at: Sep 13 2016 6:00 pm
  • Presented by: Tim White, Director of Product Management, Qualys and Hariom Singh, Subject Matter Expert, Qualys
  • From:
Your email has been sent.
or close