No sessions of this type is available on this day.
|
9:30 AM |
Show opens |
10:00 - 10:15 AM |
Gain Unprecedented Visibility with Global AssetView
Cyrus Tata, Technical Account Manager, Qualys
The digital transformation and the ever-evolving cybersecurity threat landscape introduce new technology at increasing variety, scale and speed. Simultaneously, teams are trying to manage resources under budget constraints and with siloed security solutions. Learn to tackle these challenges by delivering unprecedented visibility into all environments with one tool: Qualys Asset Inventory - a single and unified solution that enables better collaboration and strategic planning across IT and Infosec. See how Asset Inventory discovers assets across global hybrid infrastructure, normalizes and categorizes each hardware and software, and enriches with non-discoverable asset intelligence such as vendor lifecycle information.
|
11:00 – 11:15 AM |
Supporting Security Challenges in Digital Transformation
Marco Rottigni, Chief Technical Officer, EMEA, Qualys
The most scalable way to prevent breaches of endpoints, servers, and cloud workloads is to reduce the attack surface of the asset itself. Operational vulnerability management, remediation prioritization, transparent patching, secure configuration assessment, real-time activity monitoring, and active threat hunting delivered by a unified security platform can significantly reduce the likelihood of breaches by focusing on reducing the attack surface of enterprise IT environments. In this session, learn how to identify, remediate, detect, and respond to common and targeted attacks that can evade traditional and next-gen prevention technologies.
|
12:00 – 12:15 PM |
A 360-degree Approach to Securing Public Clouds
Hari Srinivasan, Director, Product Management, Qualys
Cloud is a core fabric of digital transformation, as users have a shared security responsibility with the cloud providers. This session will introduce the threats and solutions needed to secure cloud workloads and cloud infrastructure. Learn to gain visibility of your public clouds, secure workloads from both internal and perimeter vulnerabilities, and set up continuous security monitoring of cloud resources to avoid issues such as data leaks and cryptomining attacks through your cloud infrastructure.
Hari Srinivasan's bio
|
1:00 – 1:15 PM |
The Art of Vulnerability Management: from Running Scans to Managing Risk
Jimmy Graham, Sr. Director, Product Management, Qualys
To address the challenges of vulnerability detections increasing year over year, Qualys is introducing new ways to visualize vulnerability data, layering Real-time Threat Information on top of detected vulnerabilities to provide consistent and automated remediation prioritization. AssetView technology in Qualys Vulnerability Management allows users to instantly search across vulnerabilities and create dynamic widgets and dashboards within the VM module. See the new VM Dashboard and instant search capabilities, a demo of Qualys Threat Protection, as well as a sneak peek at our new Reporting Module that will unify reports across the Enterprise TruRisk Platform.
Jimmy Graham's bio
|
2:00 – 2:15 PM |
Qualys Container Security - Visibility and Security for Containers from Build to Deployments
Hari Srinivasan, Director, Product Management, Qualys
Containers are the most sought after development tool for microservices. Their simplicity and portability allow DevOps to create true agile builds within development cycles. However, this new kind of environment brings a new set of security threats at every phase of this cycle - from unvalidated software entering the environment, to secrets being leaked, to runtime drifting and breaking immutable behaviors. This session outlines common security risks and practical use cases across every phase in order to help security teams better understand how to efficiently manage security at the speed and scale of DevOps.
Hari Srinivasan's bio
|
3:00 – 3:15 PM |
Cloud Migration and Vulnerability Management - How Qualys Supported Our Move
Robert Barrow, Security Officer, Secure Trading
Secure Trading used Qualys to ensure that the migration from a traditional on-premises server farm to an agile cloud solution was secure, and completed cost effectively. Hear how the team used Qualys before, during and after the transition.
|
3:20 – 3:45 PM |
Security at the speed of DevOps - Building In, not Bolting On
Hari Srinivasan, Director, Product Management, Qualys
Location: Strategy Talks
Security embedded within DevOps reduces risk exposure up to 80%. Adopt security automation in the DevOps process, providing automation and actionable data to developers when and where needed. Use practices like AMI bakery, integrated deployment, and closed-loop automation from detection to remediate. Building security into the toolchain to deliver secure applications at the speed and scale of DevOps.
Hari Srinivasan's bio
|
3:30 PM |
Join us for a beer
|
4:00 – 4:15 PM |
Agile Harmonisation of IT Security & Compliance in Digital Transformation journeys
Marco Rottigni, Chief Technical Officer, EMEA, Qualys
Organisations undertaking digital transformation journeys are often facing challenges in structuring the processes efficiently to cope with dissolving barriers, ever changing IT landscape and a security posture that requires augmented capabilities.
We'll analyse in theory and practice how to evolve a traditional waterfall approach towards an agile one, to empower orchestration and communication among silos to achieve a single source of truth.
|
5:00 - 5:15 PM |
Incorporate Visibility of Inaccessible or Sensitive Assets into Your Overall Vulnerability and Compliance Program
Valdas Bycenkovas, Technical Account Manager, Qualys
Organizations using programmable logic controllers (PLC) and other secretive or disconnected assets can be challenged to incorporate them into the scope of their overall cybersecurity and risk program. Such assets do not allow traditional remote or agent-based scanning and thus remain outside the scope of security assessments. Learn how Qualys Offline Device Assessment, an extension of the Qualys sensor family, enables these organizations to enhance overall risk analysis by extending their single-pane-view of security and compliance to these inaccessible or sensitive assets.
|
5:30 PM |
Show closes |