See Qualys exhibiting at the following industry trade shows:

Mar 4
First Tuesday Club
London, UK
Mar 5 – 6
IA Practitioners' Event 2014
York Racecourse, UK
Mar 6
Data Connectors - Des Moines
Des Moines, IA
Mar 11
2014 ISE Southeast
Atlanta, GA
Mar 13
Interface - Portland
Portland, OR
Mar 14
ST'HACK
Bordeaux, France
Mar 17 – 18
SANS ICS Security Summit 2014
Orlando, FL
Mar 19 – 20
IT Meetings
Cannes, France
Mar 19
CRIP - Réseaux & Sécurité
Paris, France
Mar 20
IDC IT Security Roadshow, Sofia
Sofia, Bulgaria

Qualys hosts ongoing regional conferences for security professionals to meet and learn with your peers. Our conferences accommodate a forum to share information on a variety of technical topics such as vulnerability management, policy compliance, risk management, etc. Participation at Qualys customer and prospect events is an excellent, free way to receive technical content, education and to engage with your peers.

Mar 26
Les Débats
Paris, France
May 13
Les Débats
Paris, France
Sep 9
Les Débats
Paris, France
Dec 2
Les Débats
Paris, France

See Qualys speaking at the following industry trade shows:

Date: March 5, 2014 – 1:45 PM GMT
Topic: Vulnerability and Configuration Management in PSN Environments
Event: IA Practitioners' Event 2014
Location: York Racecourse, UK
Qualys Speaker: Gordon Caulfield, Subject Matter Expert, GRC EMEA North, Qualys Ltd.

Date: March 10, 2014 – 11:10 AM PDT
Topic: 2014: The Year in Which We Cannot Ignore SCADA
Event: Security B-Sides Vancouver
Location: Vancouver, BC, Canada
Qualys Speaker: Amol Sarwate, Director of Vulnerability Labs for Qualys

Date: March 27, 2014 – 2:15 PM SGT
Topic: Owning a Building: Exploiting Access Control and Facility Management Systems
Event: Black Hat Asia
Location: Marina Bay Sands, Singapore
Qualys Speaker: Billy Rios, Director of Vulnerability Research and Threat Intelligence for Qualys

Date: April 14, 2014 – 5:30 PM CEST
Topic: Continuous Monitoring : du concept à la réalité
Event: Lundi de l’IE
Location: Paris, France
Qualys Speaker: François Gratiolet, CSO South EMEA, Qualys

Date: April 24, 2014 – 10:30 AM CEST
Topic: Continuous & Automatic SANS TOP-20 Controls Efficiently Reduce Impact of Cyber-Threats
Event: (ISC)2 Secure Central & Eastern Europe 2014
Location: Krakow, Poland
Qualys Speaker: Marek Skalicky

Date: April 29, 2014 – 12:00 PM BST
Topic: SSL/TLS and PKI: Still Secure?
Event: Infosecurity Europe
Location: London, UK
Qualys Speaker: Ivan Ristic

Date: May 5, 2014 – 9:30 AM EDT
Topic: Web Security Myths and Monsters
Event: Financial Services ISAC Summit
Location: Amelia Island, FL
Qualys Speaker: Michael Shema

Date: May 7, 2014 – 11:00 AM EDT
Topic: Continuous Monitoring with the Top 20 Critical Security Controls
Event: Financial Services ISAC Summit
Location: Amelia Island, FL
Qualys Speaker: Wolfgang Kandek

Mar 12
Managing Risk and Vulnerabilities in a Business Context
Webex
Cyber attacks have a direct impact on the bottom line, yet most organizations lack the visibility and understanding to manage IT risk from the business perspective. In this webcast, our panel of experts will discuss how to shift from viewing IT risk in bits and bytes to having an impact on critical applications in the data center. By joining this webcast, you will: -Learn why and how more organizations are beginning to move ownership of IT risk to the business -Understand how to aggregate and score vulnerabilities associated with data center applications and their associated physical or virtual servers -See a live demonstration of the integration between Qualys and AlgoSec that enables business stakeholders to “own the risk” A live 15 min Q&A session will follow.
Mar 13
Strong Security Drives Compliance
Webex
Aging infrastructures, ongoing cyber threats, and lack of actionable information are just a few of the challenges that make organizations in the energy sector vulnerable to network breaches. To effectively manage their security posture, organizations need to monitor and manage the ongoing gaps in their IT infrastructure. Qualys and VioPoint are sponsoring an upcoming webcast that will share best practice tools and process for addressing these difficult challenges. By joining this webcast, you will: -Learn how to accurately profile and effectively manage vulnerabilities in your environment. -Understand how large quantities of data can be transformed into actionable results that will reduce organizational risk. -Understand best practices for establishing a vulnerability management program. A live 15 min Q&A session will follow.
Mar 27
Reviewing the Latest OWASP Top 10
Webex
The OWASP Top 10 has been updated for another year. The list covers major security issues that affect all kinds of web applications, from sophisticated exploits to simple attacks that compromise millions of passwords at a time. We'll review the issues that it's covered over the years and how the changes reflect the current state of web security. Finally, we'll discuss different ways to interpret the list in order to make it a useful part of your web security program. In this webcast learn: -The changes to the latest Top 10 list -How to interpret the differences between vulnerabilities, exploits, and weaknesses -How to apply and audit these steps for your web application A live 15 min Q&A session will follow.
Apr 1
SANS Survey on Control Systems Security
GoTo Meeting
This second survey on the state of security in control systems will follow key trends introduced in our first survey on SCADA security published in 2013. In that survey, responses from nearly 700 participants revealed the following: -Slightly greater than 40% of respondents had their control systems hacked, suspected they were hacked and couldn't prove it, or didn't know. -Their biggest concerns were targeted malware like Stuxnet, followed by insider threat and hacktivism. -Most were protecting computer assets (80%) and network devices (81%), while only 35% were focusing security on inherently vulnerable control system protocols -NIST was the most used guide for industrial control systems security, whereas NERC CIP placed third. Our 2014 State of Control Systems Security Survey examines new risks and threats that control system operators are concerned about today and what progress has been made in education, awareness and risk management. Register for this webcast and be among the first to receive the associated survey report developed by SANS Analyst and SCADA/ICS expert Matthew Luallen.

Training events in addition to the training events automatically added in from GeoLearning.

There are no events at this time.

Loading calendar...

Show only:
Qualys Solutions
Qualys Community
Free Tools & Trials
Free Trial

Nothing to install or download!

1 (800) 745 4355