Cloud Platform
Support
Contact us

Black Hat USA 2021

See your complete security posture and respond from a single, actionable view!

We are excited to see you virtually on August 4-5 at Black Hat! Schedule a meeting with a Qualys security expert, watch our best practices sessions, and learn how to get more security with Qualys.

Free Business Pass

Register for free access to the Business Hall, Arsenal, Community Programs and Sponsored Sessions

Qualys sessions at Black Hat USA

IN-PERSON SESSION:

Defense Strategies to Combat Sophisticated Ransomware and Multi-Vector Attacks

August 4, 11:30 AM – 12:20 PM

Shailesh Athalye, Senior Vice President, Product Management, Qualys

Every report and metric indicate that attacks are growing increasingly more sophisticated, and it's harder than ever to defend against them. Day in and day out cybercriminals launch sophisticated attacks to discover assets connecting to your environment and exploit your ever-increasing attack surface. They drop malicious objects, disguise themselves as authentic users, and discover and hold your precious data ransom before you can even detect their presence.

To defend themselves, companies need to detect attacks early, gather the intelligence to understand the attack, and prevent the attacks from occurring in the future. This session will dive into why multiple point solutions and manual security response strategies are no longer enough. Shailesh Athalye, Senior Vice President, Product Management at Qualys will share how security teams can gain the upper hand against ransomware and other sophisticated attacks by unifying their security strategy - managing asset inventory for cybersecurity, prioritizing vulnerabilities and automating remediation with zero-touch patching per threat indicators, and taking an effective multi-vector approach to detecting and responding to malicious attacks.

Alan Shimel, CEO and Founder, MediaOps
Dr. Jason Gamage, Head of Information Security, Fashion Nova
Eran Livne, Director, Product Management, Qualys

Almost weekly, hackers discover and exploit vulnerabilities in popular programs like SolarWinds and Microsoft Exchange Server, impacting thousands. While it would be great to eradicate vulnerabilities in the programs themselves, it is unlikely to happen any time soon. Join us as Alan Shimel of Security Boulevard talks with Eran Livne, director of product management, endpoint remediation at Qualys, to discuss the importance of vulnerability patching. They'll discuss why companies fail to patch promptly, even when patches are available, and other barriers companies face that delay patching. We'll also discuss strategies to prioritize the right set of vulnerabilities and provide tips for reducing risk with efficient patch deployment models.

VIRTUAL SESSION:

Taming Vulnerability Management Overload

August 4, 10:50 – 11:10 AM

VIRTUAL SESSION:

Reinventing Asset Inventory for Security

August 5, 11:20 AM – 12:10 PM

David Spark, CISO Podcast
Ben Carr, CISO, Qualys
Ed Rossi, VP Product Management, Qualys

Today's IT environments are growing increasingly complex and securing them is even more so. The rapid expansion and adoption of new technologies wreak havoc on security teams as they attempt to manage and secure an ever-changing landscape. Those who rely on asset inventory from their IT counterparts are challenged by a lack of security context for assets, and they miss an opportunity to identify and fix asset-centric issues like EOL or unauthorized software that they can address even before they run their vulnerability management program.

Join David Spark of the CISO Podcast and Qualys executives Ben Carr, CISO and Ed Rossi, VP Product Management, to discuss the role asset inventory plays in your overall security strategy. They'll cover the importance of security context for IT assets, which teams benefit from the information, and how to effectively implement a cybersecurity asset management practice.

Atul Nair, Malware Researcher, Qualys
Harshal Tupsamudre, Senior Threat Researcher, Qualys

Persistence consists of techniques that adversaries use to maintain their foothold on systems across restarts. Techniques used for persistence include any access, action, or configuration changes that allow attackers retain access on systems. Persistence is one of the more sought-after techniques of an attacker. Every 3 techniques out of top 10 used by Adversaries belong to Persistence. We leveraged data from MITRE ATT&CK and open-source cyber threat intelligence to understand how adversary achieves persistence. We created Tenacity, a light-weight adversary emulation tool that emulates over 30+ persistence techniques using 100+ procedures employed by attackers in the wild. Using this tool the organizations and individuals can quickly validate the risk posture and exposure of their business as well as the performance of the existing security solutions.

DEF CON VIRTUAL SESSION:

Adversary Village

Tenacity: An Adversary Emulation Tool for Persistence

August 6 - 8, 2021

Schedule a demo now!

Can't wait for Black Hat? Meet with us now to see a demo or talk shop!

Visit us virtually

Stop by our virtual booth to schedule a meeting or demo with our product managers, technical account managers and other experts. Sign up for any virtual pass (including the free virtual Business Pass) to see us online.

Unfortunately, in light of CDC guidance on the COVID-19 Delta variant and out of concern for the safety of Qualys employees, Black Hat attendees, and residents of Las Vegas, Qualys has made the tough decision to forgo our in-person presence at Black Hat USA 2021. We were very much looking forward to being at the event in person and will continue to support it through our virtual presence.

Meet with a Qualys Expert

Sign up for any virtual pass (including the free virtual Business Pass) and schedule a meeting via the Black Hat virtual site when it's live starting in late July.