hamburger menu
  • Mumbai 10 MAY
  • Other locations
    • Dubai 8 May
    • Las Vegas 14-15 November
    • Berlin 27 November
    • London 29 November
    • Paris 6 December
Register

From Securing our Networks to Enabling Digital Transformation of our Enterprises

10 May 2018 | The Leela Hotel, Mumbai

Register Today
Engineer

Meet our Engineers

Direct interaction with the engineers building the Qualys Cloud Platform

Target and arrow

Learn Best Practices

Strategy and best practices deep dives with your peers

Monitor and click

See Solution Demos

Best-of-breed solution demos from Qualys & its integration partners

Student cap and book

Get Free Training

Free training offered year-round at qualys.com/training

Video

Agenda

  • Thursday, 10 May
8:00 – 9:00 AM
Registration
9:00 – 9:10 AM
Welcome & Opening Remarks
  • Debashish Jyotiprakash, Asia-Pacific Solution Director, Qualys
9:10 – 9:55 AM
Our Journey into the Cloud: The Qualys Cloud Platform and Architecture
  • Chris Carlson, VP, Product Management, Qualys
9:55 – 10:30 AM
Securing Your Global IT Assets
  • Cloud Agents
  • Indication of Compromise
10:30 – 11:00 AM
Refreshments and Networking
11:00 AM – 12:15 PM
Securing Your Global IT Assets
  • Vulnerability Management
  • Patch Management
  • Certificate Management
12:15 – 12:30 PM
Technology Partner Presentation - "More Than Just Automation - Extending Qualys Asset Intelligence to SIEM and GRC"
12:30 – 2:00 PM
Lunch
2:00 – 2:20 PM
Customer Presentation - "BFSI CyberSecurity Regulations & Need for automation and integration"
2:20 – 3:10 PM
Securing Your Cloud Environments
  • Container Security
  • CloudView: Cloud Inventory and Cloud Security Assessment
3:10 – 4:00 PM
Ensuring Continuous Compliance
  • Policy Compliance
  • File Integrity Monitoring
  • Security Assessment Questionnaire
4:00 – 4:30 PM
Refreshments and Networking
4:30 – 4:50 PM
Customer Presentation - "Save Time for Remediation - Security Process Automation"
  • Rishi Rajpal, Privacy, Security, Compliance and Continuity Leader, Concentrix
4:50 – 5:20 PM
Securing Your Web Applications
  • Web Application Scanning
  • Web Application Firewall
5:20 – 5:45 PM
Passive Scanner and IT Asset Management
  • Pablo Quiroga, Director, Product Management, IT Asset Management
5:45 – 6:30 PM
Feedback and Partner pavillion tour
6:30 – 7:45 PM
Cocktails - O-59 Lounge

We are offering two classes on Tuesday, May 8. You may sign up for one class per day.


VULNERABILITY MANAGEMENT AGENDA

Click here to register

AM Session – Vulnerability Management

9:00 – 10:00 AM
Host Assets
  • Agenda
  • The Qualys Cloud Platform
  • Overview of the Vulnerability Management Lifecycle
  • HANDS-ON LAB: Getting Started
10:00 – 11:00 AM
KnowledgeBase
  • Vulnerabilities and the KnowledgeBase
  • Building and applying Search Lists
  • HANDS-ON LAB: Creating and Importing Search Lists
11:00 AM – 12:00 PM
Scanning
  • Scanning Overview
  • Scanning Configuration
  • Authenticated Scanning
  • Cloud Agent Introduction
  • HANDS-ON LAB: Vulnerability Scanning
12:00 – 1:00 PM
Lunch

PM Session – Assets, Scanning, and Reporting

1:00 – 2:30 PM
Assets and Asset Inventory
  • Asset Groups and Business Risk
  • Dynamic Asset Tagging
  • AssetView, Advanced Search, and Dynamic Dashboards
  • HANDS-ON LAB – Organizing and Viewing Assets
2:30 – 4:30 PM
  • Reporting Overview and Templates
  • Scheduling Reports
  • Reporting Use Cases
  • HANDS-ON LAB: Reporting
  • User Roles
  • Building Remediation Policies
  • HANDS-ON LAB: User Creation and Remediation Policies
4:30 – 5:00 PM
  • Certification Exam

WEB APPLICATION SCANNING AGENDA

Click here to register

9:00 – 10:00 AM
Web Application Scanning Overview
  • The WAS Lifecycle
  • Scanning Your Web Architecture
  • The Qualys Cloud Platform
10:00 – 10:30 AM
The Qualys KnowledgeBase
  • The Qualys KnowledgeBase
  • Grouping Vulnerabilities
  • HANDS ON LAB: Basic Setup
10:30 AM – 12:00 PM
Basic Application Setup and Discovery
  • Defining an Application
  • Adding, Removing, and Managing Web Applications
  • Crawl Scope
  • Path Fuzzing
  • Scanning workflow
  • Form Training
  • Discovery Scan
  • HANDS-ON LAB: Defining an App and Launching a Discovery Scan
12:00 – 1:00 PM
Lunch
1:00 – 2:00 PM
Advanced Application Setup and Scanning
  • Scanning Configuration
  • Crawling your Application
  • Progressive Scanning
  • Configuring DNS Override
  • Form Based Authentication
  • Crawl Exclusions
  • HANDS-ON LAB: Vulnerability Scan
2:00 – 3:00 PM
Reporting
  • Dashboard
  • Web Application, Scan, Scorecard, and Catalog Reporting
  • Useful QIDs
  • HANDS-ON LAB: Customized Reporting
3:00 – 4:30 PM
Tags and Users
  • Tag Creation
  • User Roles and Permissions
  • HANDS-ON LAB: Asset Tags and User Privileges
4:30 – 5:00 PM
Burp and Malware Detection
  • Burp Professional Integration Overview
  • Malware Detection Application
  • HANDS-ON LAB: Burp integration and Malware Detection

We are offering two classes on Wednesday, May 9. You may sign up for one class per day.


VULNERABILITY MANAGEMENT AGENDA

Click here to register

AM Session – Vulnerability Management

9:00 – 10:00 AM
Host Assets
  • Agenda
  • The Qualys Cloud Platform
  • Overview of the Vulnerability Management Lifecycle
  • HANDS-ON LAB: Getting Started
10:00 – 11:00 AM
KnowledgeBase
  • Vulnerabilities and the KnowledgeBase
  • Building and applying Search Lists
  • HANDS-ON LAB: Creating and Importing Search Lists
11:00 AM – 12:00 PM
Scanning
  • Scanning Overview
  • Scanning Configuration
  • Authenticated Scanning
  • Cloud Agent Introduction
  • HANDS-ON LAB: Vulnerability Scanning
12:00 – 1:00 PM
Lunch

PM Session – Assets, Scanning, and Reporting

1:00 – 2:30 PM
Assets and Asset Inventory
  • Asset Groups and Business Risk
  • Dynamic Asset Tagging
  • AssetView, Advanced Search, and Dynamic Dashboards
  • HANDS-ON LAB – Organizing and Viewing Assets
2:30 – 4:30 PM
  • Reporting Overview and Templates
  • Scheduling Reports
  • Reporting Use Cases
  • HANDS-ON LAB: Reporting
  • User Roles
  • Building Remediation Policies
  • HANDS-ON LAB: User Creation and Remediation Policies
4:30 – 5:00 PM
  • Certification Exam

ADVANCED VULNERABILITY MANAGEMENT AGENDA

Click here to register

9:00 – 10:00 AM
Qualys Cloud Suite
  • The Qualys Cloud Platform
  • Integrated Apps
  • HANDS-ON LAB: Getting Started
10:00 AM – 12:00 PM
Scanning in Vulnerability Management
  • Authenticated Scanning
  • Continuous Monitoring
  • AWS Scanning
  • HANDS-ON LAB: Getting Started
12:00 – 1:00 PM
Lunch
1:00 – 2:00 PM
Cloud Agent
  • Deployment
  • Agent Status and Lifecycle
  • Configuration Profile
  • HANDS ON LAB: Cloud Agent installation on student virtual machine
2:00 – 3:30 PM
AssetView and Advanced Reporting
  • Advanced Search
  • Sorting queries
  • Dynamic Dashboards
  • Dynamic Asset Tagging
  • Reporting tips and best practices
  • HANDS-ON LAB: AssetView Labs
3:30 – 4:30 PM
Threat Protection
  • Real-time Threat Indicators
  • Threat feed
  • Reports using RTIs
  • HANDS-ON LAB – Organizing and Viewing Assets
4:30 – 5:00 PM
  • Q&A

Pricing

Attendance at Qualys Security Conference is complimentary. This includes access to the pre-conference training (requires separate registration), and the conference and lunch on 10 May; travel and hotel accommodations are not included.

Location

We are pleased to host QSC at the Leela Hotel, Mumbai. The hotel can be contacted directly at +91 22 6691 1234 or reservations@theleela.com.


The Leela Mumbai

The Leela Mumbai
Sahar, Andheri (E)
Mumbai 400 059
India
T: +91 22 6691 1234

Sponsors

  • ACPL
  • AlgoSec
  • IBM Security
  • NII Consulting
  • RSA
  • ServiceNow
  • Tata Communication
  • Verizon
Sameer Ratolikar

Sameer Ratolikar

CISO, HDFC Bank

Sameer Ratolikar is a Computer Engineer with 21 years of work experience in information security and IT. Sameer has been associated with cyber security initiatives of RBI, IBA and the Ministry of IT and has been a speaker at professional forums like the Data Security Council of India. At HDFC Bank Sameer Ratolikar heads the Information Security Group and is responsible to provide leadership to the development and implementation of Information Security programs across the Bank.

Rishi Rajpal

Rishi Rajpal

Privacy, Security, Compliance and Continuity Leader, Concentrix

Over 17+ years of global experience and deep expertise in Information Technology with specialization in Information Security, Technology Risk Management and Privacy. My experience in Information Security encompasses all aspects of the discipline, including advisory and consulting, policy, processes and standards, engineering and operational support for clients and for the internal organization.

Huzefa Goawala

Huzefa Goawala

Business Leader, RSA Archer

Huzefa Goawala is the RSA Archer business leader for India and SAARC. Based in Mumbai he is responsible for leading RSA’s GRC business in the region. He has an overall working experience of 18+ years, 11 years of which he has been focused on Information Security and GRC domains.

Huzefa has extensive experience working across technologies and driving regional businesses in organizations such as Oracle, Sun Microsystems, etc. He led the Security Solutions business for Oracle, and while at Sun he was responsible for the software business.