


Want to Manage Cyber Risk at the Speed of Business with Agentic AI?
Join Qualys at Booth 703 to learn how the Risk Operations Center – powered by Agentic AI – enables organizations to shift from reactive security postures to continuous, measurable risk mitigation. Schedule a meeting with our product managers and technical account managers. Attend one of our booth presentations and stay for a product demo for a chance to win a prize.

Meet with a
Qualys Expert
Agenda
Conference Sessions
10:00 AM - 10:20 AM

Siddharth Bhatia
Director, Product Management - CSAM & EASM - Product Management
It’s time for a smarter strategy. The Risk Operations Center (ROC), powered by Qualys Enterprise TruRisk Management, transforms your security from being reactive to strategic. By unifying exposure signals, threat intelligence and business context, you can prioritize and remediate the risks that could have the greatest impact on your organization. In this session, you'll learn how to break free from exposure overload and move to a unified, risk-based approach that enables your team to focus on what truly matters.
10:55 AM - 11:15 AM

Dan Gislason
Senior SME, Patch Management & Remediation
11:50 AM - 12:10 PM

Lina Dabit
Executive Director, Optiv
1:40 PM - 1:55 PM

Russ Sanderlin
Director, SME, VMDR
2:20 PM - 2:35 PM

Kishore Janakiraman
Director, Subject Matter Expert
In this session, we’ll explore a practical path forward. Learn how to modernize your application security strategy to secure your web apps and APIs, including emerging AI/LLM-driven assets. Discover how to assess and prioritize risk holistically, streamline remediation across dev and security teams, and continuously monitor for real-world exploitability—turning visibility into action at scale.
Key Takeaways
- Map your application and API attack surface: Gain visibility into known, unknown, and forgotten applications and APIs, their interconnections, and embedded LLM usage.
- Protect sensitive data: Perform comprehensive risk assessments, including detection of sensitive data exposure and exploitability.
- Accelerate time to market: Streamline security workflows to support faster, safer releases.
- Reduce breach risk and build trust: Strengthen your security posture to minimize threats and increase customer confidence.
3:00 PM - 3:15 PM

Kishore Janakiraman
Director, Subject Matter Expert
3:40 PM - 4:00 PM

Kishore Janakiraman
Director, Subject Matter Expert
With Qualys, security teams move from alert overload to real-time action: orchestrating remediation, eliminating manual steps, and maintaining continuous compliance.
Learn how Qualys enables Multi-Cloud Risk Operations with TruRisk Prioritization, Attack Path Analysis, and QFlow for no-code remediation of misconfigurations and vulnerabilities.
Join this session to see how Qualys helps enterprises operationalize risk management at scale.
4:25 PM - 4:45 PM

Abhishek Singh
Vice President, Product Management
That’s why Qualys takes a risk-first approach to container security: identifying, prioritizing, and eliminating risk before it’s exploited.
In this session, we’ll unveil how Qualys is redefining container security for modern AI-driven environments through:
- Unified AI and LLM Discovery: Discover unknown LLMs across containers and Kubernetes running in hybrid cloud environments. Correlate application and infrastructure context to uncover blind spots and enable seamless cyber hygiene.
- Runtime-informed risk reduction: Go beyond alerts with eBPF-powered detection, real-time attack path analysis, and intelligent correlation from code to container to cloud—including signature-free threat classification and zero-trust sandboxing for emerging zero-day activity.
- Proactive security posture management: Scan for prompt injection and API vulnerabilities, and harden your Kubernetes and cloud control planes. Correlate and prioritize vulnerabilities across infrastructure, containers, and APIs using threat context and asset value—so you can focus efforts where they’ll make the biggest impact.
- End-to-end AI workload protection: Enable risk-minded threat detection and response across containers, Lambdas, cloud services, and identities—while tracing runtime risk back to code and ownership to accelerate response across the pipeline.
Join us to see how Qualys helps you burn down risk across your containerized AI stack—faster, smarter, and without the noise.
5:10 PM - 5:25 PM

Siddharth Bhatia
Director, Product Management - CSAM & EASM - Product Management
In this session, we’ll explore how leading orgs are embracing continuous compliance to stay ahead of audits, reduce manual effort, and build real-time trust. Inspired by recent new methodologies and tools, we’ll show how to automatically track policy drift, detect misconfigurations, and stay aligned with frameworks like NIST, CIS, and PCI—without breaking workflows.
- A playbook for embedding continuous control checks across cloud and on-prem
- Strategies to align Security, IT, and Audit teams on shared evidence
- A smarter, calmer path to always-on compliance
10:00 AM - 10:20 AM

Siddharth Bhatia
Director, Product Management - CSAM & EASM - Product Management
It’s time for a smarter strategy. The Risk Operations Center (ROC), powered by Qualys Enterprise TruRisk Management, transforms your security from being reactive to strategic. By unifying exposure signals, threat intelligence and business context, you can prioritize and remediate the risks that could have the greatest impact on your organization. In this session, you'll learn how to break free from exposure overload and move to a unified, risk-based approach that enables your team to focus on what truly matters.
10:45 AM - 11:05 AM

Dan Gislason
Senior SME, Patch Management & Remediation
11:30 AM - 11:50 AM

Raymond Kyte
White Tuque’s Lead Solution Architect
12:15 PM - 12:35 PM

Kishore Janakiraman
Director, Subject Matter Expert
With Qualys, security teams move from alert overload to real-time action: orchestrating remediation, eliminating manual steps, and maintaining continuous compliance.
Learn how Qualys enables Multi-Cloud Risk Operations with TruRisk Prioritization, Attack Path Analysis, and QFlow for no-code remediation of misconfigurations and vulnerabilities.
Join this session to see how Qualys helps enterprises operationalize risk management at scale.
1:40 PM - 1:55 PM

Russ Sanderlin
Director, SME, VMDR
2:20 PM - 2:35 PM

Siddharth Bhatia
Director, Product Management - CSAM & EASM - Product Management
- A complete view of all assets with cyber risk context, including security gaps, internet exposures, and relationships to your crown jewels
- Real-time threat intelligence, including known exploits and MITRE ATT@CK mapping to drive the universal language of TruRisk™ across all asset categories
- Orchestrated response, whether it's connected workflow to ITSM tools, automated patch jobs, and compensating controls to close attack paths as quickly as possible
Join us to learn how Qualys can simplify an increasingly complex threat landscape by streamlining your exposure management program with VMDR and CSAM.
3:00 PM - 3:20 PM

Abhishek Singh
Vice President, Product Management
That’s why Qualys takes a risk-first approach to container security: identifying, prioritizing, and eliminating risk before it’s exploited.
In this session, we’ll unveil how Qualys is redefining container security for modern AI-driven environments through:
- Unified AI and LLM Discovery: Discover unknown LLMs across containers and Kubernetes running in hybrid cloud environments. Correlate application and infrastructure context to uncover blind spots and enable seamless cyber hygiene.
- Runtime-informed risk reduction: Go beyond alerts with eBPF-powered detection, real-time attack path analysis, and intelligent correlation from code to container to cloud—including signature-free threat classification and zero-trust sandboxing for emerging zero-day activity.
- Proactive security posture management: Scan for prompt injection and API vulnerabilities, and harden your Kubernetes and cloud control planes. Correlate and prioritize vulnerabilities across infrastructure, containers, and APIs using threat context and asset value—so you can focus efforts where they’ll make the biggest impact.
- End-to-end AI workload protection: Enable risk-minded threat detection and response across containers, Lambdas, cloud services, and identities—while tracing runtime risk back to code and ownership to accelerate response across the pipeline.
Join us to see how Qualys helps you burn down risk across your containerized AI stack—faster, smarter, and without the noise.
3:45 PM - 4:00 PM

Kishore Janakiraman
Director, Subject Matter Expert
In this session, we’ll explore a practical path forward. Learn how to modernize your application security strategy to secure your web apps and APIs, including emerging AI/LLM-driven assets. Discover how to assess and prioritize risk holistically, streamline remediation across dev and security teams, and continuously monitor for real-world exploitability—turning visibility into action at scale.
Key Takeaways
- Map your application and API attack surface: Gain visibility into known, unknown, and forgotten applications and APIs, their interconnections, and embedded LLM usage.
- Protect sensitive data: Perform comprehensive risk assessments, including detection of sensitive data exposure and exploitability.
- Accelerate time to market: Streamline security workflows to support faster, safer releases.
- Reduce breach risk and build trust: Strengthen your security posture to minimize threats and increase customer confidence.

Visit us at our booth and win prizes
Stop by booth 703 to meet with our product managers, technical account managers, and other experts.
Attend one of our in-person booth presentations and get the chance to win one of our great prizes! Must be present to win.
Register Now