Hi [[ session.user.profile.firstName ]]

Vulnerability Scanning and Penetrating Testing, Do I need both?

As an auditor and cybersecurity professional I often find there is confusion between vulnerability scanning and penetration tests. Often people will use the terms interchangeably. However, they are very different tests, testing different things for different reasons. Join this webinar and learn the differences and some best practices to get the best bang for your buck. This session will include a demonstration on how Qualys can help organizations manage vulnerabilities and monitor their systems.
Recorded Nov 7 2018 74 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Donald E. Hester, Robert De Roeck, & Qualys
Presentation preview: Vulnerability Scanning and Penetrating Testing, Do I need both?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Who should setup access in the ERP (Financial Application)? Recorded: Dec 7 2018 64 mins
    Donald E. Hester; Robert DeRoeck; Ron Puccinelli
    As an IT auditor for local governments, one of the most often asked I get during audits is who should setup user access in the financial application. There is a debate of whether it should be IT or finance staff that create accounts and setup access. As with any professional my answer is it depends. It depends upon other controls that might be in place. What I like to do with clients is walk them through the needs and risks to help them design and understand the process they come up with. Let’s walk thought the logic and see what might be the best answer for your organization. Plus, we will answer a question from a listener on hacking Instagram accounts.
  • Vulnerability Scanning and Penetrating Testing, Do I need both? Recorded: Nov 7 2018 74 mins
    Donald E. Hester, Robert De Roeck, & Qualys
    As an auditor and cybersecurity professional I often find there is confusion between vulnerability scanning and penetration tests. Often people will use the terms interchangeably. However, they are very different tests, testing different things for different reasons. Join this webinar and learn the differences and some best practices to get the best bang for your buck. This session will include a demonstration on how Qualys can help organizations manage vulnerabilities and monitor their systems.
  • Cybersecurity Documentation Recorded: Nov 2 2018 63 mins
    Donald E Hester, Ron Puccinelli, & Robert De Roeck
    Policies, Plans, Procedures and supporting documentation. We will cover the types of cybersecurity documents an organization may have, what topics they should cover, and guidelines on what should be included in your policies. We will also focus on the unique challenges and opportunities for state and local governments. Cities, Districts and Counties have an advantage on policy development.
  • The Need for Cybersecurity Awareness Recorded: Oct 17 2018 64 mins
    Donald E. Hester, Rhett Redelings, Robert DeRoeck, & Heather Johnstone
    Cyber threats continue to evolve and become more sophisticated. The majority of hacks and attacks exploited one vulnerability, people. Today’s threat landscape requires focusing on the traditional weakest link, people. One of today’s largest challenges is having management invest in cybersecurity awareness and training. Don’t leave you first and last line of defense defenseless.
  • Nation States - Threat Source (Part 2) Recorded: Oct 12 2018 64 mins
    Donald E. Hester and Robert De Roeck
    Part 2 There has been a rise in the Nation State sponsored, backed, or directed cyber-attacks if not at least an awareness of such attacks. Whether it is a rise in the Nation State cyber-attacks or just the awareness of it, I think it is time to take a look at Nation States as a serious threat actor and start to look at what we know about them. Their motivation and capabilities differ from the traditional hackers and cybercriminals and as such may require a different response in mitigating threats.
  • Nation States - Threat Source Recorded: Oct 4 2018 60 mins
    Donald E. Hester & Robert De Roeck
    There has been a rise in the Nation State sponsored, backed, or directed cyber-attacks if not at least an awareness of such attacks. Whether it is a rise in the Nation State cyber-attacks or just the awareness of it, I think it is time to take a look at Nation States as a serious threat actor and start to look at what we know about them. Their motivation and capabilities differ from the traditional hackers and cybercriminals and as such may require a different response in mitigating threats.
Working together to make the world cyber safe.
Covering cybersecurity focused on the issues surrounding the challenges of small organizations and local governments. We will be coving issues related to compliance, PCI, NIST, audit findings, IT governance & management, disruptive technologies, current risks, common vulnerabilities, and suggested remediation.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Vulnerability Scanning and Penetrating Testing, Do I need both?
  • Live at: Nov 7 2018 6:00 pm
  • Presented by: Donald E. Hester, Robert De Roeck, & Qualys
  • From:
Your email has been sent.
or close