See Qualys exhibiting at the following industry trade shows:

Mar 4
First Tuesday Club
London, UK
Mar 5 – 6
IA Practitioners' Event 2014
York Racecourse, UK
Mar 6
Data Connectors - Des Moines
Des Moines, IA
Mar 11
2014 ISE Southeast
Atlanta, GA
Mar 13
Interface - Portland
Portland, OR
Mar 14
Bordeaux, France
Mar 17 – 18
SANS ICS Security Summit 2014
Orlando, FL
Mar 19 – 20
IT Meetings
Cannes, France
Mar 19
CRIP - Réseaux & Sécurité
Paris, France
Mar 20
IDC IT Security Roadshow, Sofia
Sofia, Bulgaria

Qualys hosts ongoing regional conferences for security professionals to meet and learn with your peers. Our conferences accommodate a forum to share information on a variety of technical topics such as vulnerability management, policy compliance, risk management, etc. Participation at Qualys customer and prospect events is an excellent, free way to receive technical content, education and to engage with your peers.

Mar 26
Les Débats
Paris, France
May 13
Les Débats
Paris, France
Sep 9
Les Débats
Paris, France
Dec 2
Les Débats
Paris, France

See Qualys speaking at the following industry trade shows:

Date: March 5, 2014 – 1:45 PM GMT
Topic: Vulnerability and Configuration Management in PSN Environments
Event: IA Practitioners' Event 2014
Location: York Racecourse, UK
Qualys Speaker: Gordon Caulfield, Subject Matter Expert, GRC EMEA North, Qualys Ltd.

Date: March 10, 2014 – 11:10 AM PDT
Topic: 2014: The Year in Which We Cannot Ignore SCADA
Event: Security B-Sides Vancouver
Location: Vancouver, BC, Canada
Qualys Speaker: Amol Sarwate, Director of Vulnerability Labs for Qualys

Date: March 27, 2014 – 2:15 PM SGT
Topic: Owning a Building: Exploiting Access Control and Facility Management Systems
Event: Black Hat Asia
Location: Marina Bay Sands, Singapore
Qualys Speaker: Billy Rios, Director of Vulnerability Research and Threat Intelligence for Qualys

Date: April 14, 2014 – 5:30 PM CEST
Topic: Continuous Monitoring : du concept à la réalité
Event: Lundi de l’IE
Location: Paris, France
Qualys Speaker: François Gratiolet, CSO South EMEA, Qualys

Date: April 24, 2014 – 10:30 AM CEST
Topic: Continuous & Automatic SANS TOP-20 Controls Efficiently Reduce Impact of Cyber-Threats
Event: (ISC)2 Secure Central & Eastern Europe 2014
Location: Krakow, Poland
Qualys Speaker: Marek Skalicky

Date: April 29, 2014 – 12:00 PM BST
Topic: SSL/TLS and PKI: Still Secure?
Event: Infosecurity Europe
Location: London, UK
Qualys Speaker: Ivan Ristic

Date: May 5, 2014 – 9:30 AM EDT
Topic: Web Security Myths and Monsters
Event: Financial Services ISAC Summit
Location: Amelia Island, FL
Qualys Speaker: Michael Shema

Date: May 7, 2014 – 11:00 AM EDT
Topic: Continuous Monitoring with the Top 20 Critical Security Controls
Event: Financial Services ISAC Summit
Location: Amelia Island, FL
Qualys Speaker: Wolfgang Kandek

Mar 12
Managing Risk and Vulnerabilities in a Business Context
Cyber attacks have a direct impact on the bottom line, yet most organizations lack the visibility and understanding to manage IT risk from the business perspective. In this webcast, our panel of experts will discuss how to shift from viewing IT risk in bits and bytes to having an impact on critical applications in the data center. By joining this webcast, you will: -Learn why and how more organizations are beginning to move ownership of IT risk to the business -Understand how to aggregate and score vulnerabilities associated with data center applications and their associated physical or virtual servers -See a live demonstration of the integration between Qualys and AlgoSec that enables business stakeholders to “own the risk” A live 15 min Q&A session will follow.
Mar 13
Strong Security Drives Compliance
Aging infrastructures, ongoing cyber threats, and lack of actionable information are just a few of the challenges that make organizations in the energy sector vulnerable to network breaches. To effectively manage their security posture, organizations need to monitor and manage the ongoing gaps in their IT infrastructure. Qualys and VioPoint are sponsoring an upcoming webcast that will share best practice tools and process for addressing these difficult challenges. By joining this webcast, you will: -Learn how to accurately profile and effectively manage vulnerabilities in your environment. -Understand how large quantities of data can be transformed into actionable results that will reduce organizational risk. -Understand best practices for establishing a vulnerability management program. A live 15 min Q&A session will follow.
Mar 27
Reviewing the Latest OWASP Top 10
The OWASP Top 10 has been updated for another year. The list covers major security issues that affect all kinds of web applications, from sophisticated exploits to simple attacks that compromise millions of passwords at a time. We'll review the issues that it's covered over the years and how the changes reflect the current state of web security. Finally, we'll discuss different ways to interpret the list in order to make it a useful part of your web security program. In this webcast learn: -The changes to the latest Top 10 list -How to interpret the differences between vulnerabilities, exploits, and weaknesses -How to apply and audit these steps for your web application A live 15 min Q&A session will follow.
Apr 1
SANS Survey on Control Systems Security
GoTo Meeting
This second survey on the state of security in control systems will follow key trends introduced in our first survey on SCADA security published in 2013. In that survey, responses from nearly 700 participants revealed the following: -Slightly greater than 40% of respondents had their control systems hacked, suspected they were hacked and couldn't prove it, or didn't know. -Their biggest concerns were targeted malware like Stuxnet, followed by insider threat and hacktivism. -Most were protecting computer assets (80%) and network devices (81%), while only 35% were focusing security on inherently vulnerable control system protocols -NIST was the most used guide for industrial control systems security, whereas NERC CIP placed third. Our 2014 State of Control Systems Security Survey examines new risks and threats that control system operators are concerned about today and what progress has been made in education, awareness and risk management. Register for this webcast and be among the first to receive the associated survey report developed by SANS Analyst and SCADA/ICS expert Matthew Luallen.
Apr 24
Post-Mortem on Heartbleed - What Worked and What Didn’t: How the State of Colorado responded to this critical vulnerability
It has been two weeks since the wide-reaching Heartbleed vulnerability hit the Internet. In this webinar we will describe the inner workings of the flaw, detail the detection mechanisms used by Qualys, and cover less-visible instances of Heartbleed that you might be missing. Then we will cover the second step in Heartbleed remediation, the revocation and renewal of certificates, including a discussion of tools that can help. To provide a real-world perspective, the CISO of the State of Colorado Jonathan Trull will describe how the state is taking on Heartbleed
May 8
Automating Secure Configuration Assessment Best Practices
Software configuration security control is ranked 3rd among highest risk mitigation strategy recommended by SANS top 20 Critical Security Controls. Poor configuration settings or software feature misuse are negatively affect businesses by exposing them to security breaches & incidents. Institutions like Center of Internet Security (CIS) and National Institute of Standards and Technology (NIST) provide security configuration baselines for hardening operating systems and applications to help mitigate security risks. In this webcast we will discuss the following: -How effective secure configuration control are implemented to minimize security risks associated with poor configuration settings -How SaaS-based automation is a key success factor in applying the secure configuration control that addresses scalability, performance, and reliability challenges -Quick Demonstration of QualysGuard Policy Compliance

Training events in addition to the training events automatically added in from GeoLearning.

There are no events at this time.

Loading calendar...

Show only:
Qualys Solutions
Qualys Community
Free Tools & Trials
Free Trial

Nothing to install or download!

1 (800) 745 4355