10th Annual Qualys Security Conference to Feature Renowned Security Experts Discussing Security Challenges and Opportunities in the Era of Cloud Computing
Qualys Customers, Partners and Industry Experts to Discuss Effective Ways to Keep Companies Secure Against Cyber Attacks and in Compliance with Industry Regulations
REDWOOD CITY, Calif., Oct. 22, 2012 – Qualys Inc. (NASDAQ: QLYS), a pioneer and leading provider of cloud security and compliance solutions, today announced its program for the 10th Annual Qualys Security Conference in Las Vegas, twitter #qsc2012. The conference, to be held at Aria Hotel in Las Vegas, NV, October 25-26, will feature security industry experts discussing effective ways to combat security threats and cyber attacks and manage compliance. It will also provide an open forum for Qualys customers, partners and industry experts to share best practices, as well as to provide feedback to Qualys engineers as they plan their future roadmap for the QualysGuard Cloud Platform and integrated suite of solutions.
The conference agenda includes keynotes from Howard Schmidt, Former White House Cybersecurity Coordinator, and leading analysts from Gartner, Securosis and the SANS Institute.
Qualys customers, including Cisco, eBay, Officemax, Okta, Sabre Holdings and USAA will present best practices presentations, and Qualys partners including Core Security, LockPath, LogRhythm, Sourcefire, Thycotic and Verisign will present integration case studies.
Conference keynotes and session highlights include:
Title: Keynote: Presenting a Hard Target to Attackers – Operationally Effective Vulnerability Management
Speaker: Mark Nicolett, Managing VP and Distinguished Analyst, Gartner
Date: October 25, 1:30 – 2:15pm
Title: The Basics and Beyond: Managing Security Effectively
Speaker: Tony Sager, Director, SANS Institute
Date: October 25, 2:15 – 3:00pm
Title: Panel Discussion: Are You Already Compromised? If So, How Do You Know?
Moderator: Andrew Wild, CSO, Qualys
Panelist: Charles Kolodgy, Research Vice President, Secure Products, IDC
Panelist: David Baker, CSO, Okta
Panelist: Richard Mikelinich, CISO, Yale University
Date: October 25, 5:15 – 6:00pm
Title: Keynote: Vulnerability Management Evolution – From Tactical Scanner to Strategic Platform
Speaker: Mike Rothman, Analyst and President, Securosis
Date: October 26, 8:30 – 9:15am
Title: Brand and User Protection in the New gTLD World
Speaker: Alex Stamos, CTO, Artemis Internet Inc.
Date: October 26, 9:45 – 10:30am
Title: Keynote: Tubes – Postcards from Inside the Internet
Speaker: Andrew Blum, Journalist and Author of Tubes: A Journey to the Center of the Internet
Date: October 26, 1:30 – 2:15pm
This year’s Qualys Security Conference is also sponsored by Platinum Sponsors: Core Security, LockPath, LogRhythm, Sourcefire, Thycotic and Verisign, and Sponsors: Accuvant, Cyber-Ark, Dell SecureWorks and RedSeal Networks. These partners will showcase their solutions and integrations with QualysGuard in the partner pavilion at the conference.
For more information, visit: http://www.qualys.com/company/events/tradeshows/2012/qsc/las-vegas/.
Qualys Inc. (NASDAQ: QLYS), is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions helps organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including BT, Dell SecureWorks, Fujitsu, IBM, NTT, Symantec, Verizon, and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).
For more information, please visit www.qualys.com.
Qualys, the Qualys logo and QualysGuard are proprietary trademarks of Qualys, Inc. All other products or names may be trademarks of their respective companies.