See Resources

See Qualys exhibiting at the following industry trade shows:

Apr 3
IDC Security Roadshow 2017, Kuwait
Kuwait City, Kuwait
Apr 3 – 4
InfoSec Dialogue Benelux
Radisson Blu Hotel Amsterdam Airport
Apr 3 – 5
InfoSec World Conference & Expo 2017
ChampionsGate, FL
Apr 5
IDC Security Roadshow 2017, Bahrain
Manama City, Bahrain
Apr 6
Interface Iowa
Des Moines, IA
Apr 11
SANS 2017
Orlando, FL
Apr 11 – 12
Information Security Forum (ISF) for Texas Government
Austin, Texas
Apr 11
Cyber Crime Conference
Apr 12
IDC Security Roadshow 2017, Ulaanbaatar
Ulaanbaatar, Mongolia
Apr 12 – 13
IANS Information Security Forum Washington DC
Washington, D.C.

Qualys hosts ongoing regional conferences for security professionals to meet and learn with your peers. Our conferences accommodate a forum to share information on a variety of technical topics such as vulnerability management, policy compliance, risk management, etc. Participation at Qualys customer and prospect events is an excellent, free way to receive technical content, education and to engage with your peers.

Apr 18
QSC Dubai 2017
Shangri-La Hotel Dubai, UAE
Apr 26
QSC Mumbai 2017
Mumbai, India

See Qualys speaking at the following industry trade shows:

Date: April 19, 2017 – 2:00 PM PDT
Topic: How to Achieve Agility, Visibility and Security in the Cloud
Event: BrightTalk Summit: Deploying and Managing Successful Cloud Apps
Location: Virtual Event
Qualys Speaker: Syamla Banda, VP of Global Cloud Operations & DevOps, Qualys

Date: May 2, 2017 – 12:45 PM PDT
Topic: Prioritize Vulnerability Remediation
Location: The Cosmopolitan, Las Vegas
Qualys Speaker: Amol Sarwate, Director of Vulnerability Labs, Qualys

May 3
Automated Compliance Assessment for RBI Cyber Security Guidelines
Perimeterless IT infrastructure and its security is now an integral part of the operational strategies of India’s financial institutions. But the number, frequency, and impact of cyber attacks on Indian financial institutions have increased substantially, underlining the urgent need for banks to develop robust cyber security measures, and assess their security posture on a continuous basis.<br><br> The RBI Guidelines for Cyber Security assist financial institutions to achieve this through a new-era preventative security baseline. <br><br> During this webcast, Shailesh Athalye, Qualys Senior Manager, Compliance Research and Analysis, will discuss how financial institutions can easily address both the technical & procedural elements of the RBI Guidelines for Cyber Security in an automated manner using the highly scalable Qualys Cloud Platform. You will learn:<br><br> What the RBI Guidelines for Cyber Security are<br> What banks need to do to be in compliance<br> The challenges in assessing and reporting<br> How to streamline compliance with Qualys solutions<br><br> This webcast includes a live Q&A
May 4
Gain Visibility & Control of IT Assets in a Perimeterless World
In today’s perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks.<br><br> The IT assets that pose the greatest risk to your organization’s security are the ones you don’t know are there. Lack of visibility into your IT environment undermines the foundations of your enterprise security and compliance infrastructure and puts your organization at serious risk of a breach. Without knowledge of which software and devices exist in your network — whether on-premises, on endpoints, or in elastic clouds — InfoSec professionals are unable to enact proper security and protection. <br><br> During this webcast, Jimmy Graham, Director of Product Management for Qualys AssetView and Darron Gibbard, Chief Technical Security Officer for Qualys EMEA will cover the six key elements of an ideal cloud-based IT asset inventory system:<br><br> 1. Complete visibility of your IT environment<br> 2. Deep visibility into assets<br> 3. Continuous and automatic updates<br> 4. Asset criticality ranking<br> 5. Interactive, customizable dashboarding and reporting<br> 6. Integration with your CMDB<br><br> Those of you in the EU will also be interested to learn about asset inventory for GDPR compliance.<br><br> This webcast will include a live Q&A session.
May 17
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
By now I am sure you have heard about the major ransomware attack using a leaked NSA exploit known as “WannaCry” that has hit approximately 150 countries since last Friday. About 200,000 infections globally have been detected and the attack, which uses the WannaCry (WanaCrypt0r 2.0) ransomware, continues to spread.<br><br> WannaCry utilizes the ETERNALBLUE exploit targeting newly disclosed vulnerabilities (MS17-010). Once leaked, it took only 28 days for this exploit to be used in a full-scale cyber attack. Organizations that scan for vulnerabilities only monthly or less frequently can still be at risk.<br><br> Jimmy Graham, Director of Product Management for ThreatPROTECT at Qualys, will present a live webcast on Wednesday, May 17 at 10AM PDT | 1PM EDT. Join this webcast to learn about:<br><br> * Patches and other mitigations for WannaCry<br> * Detecting and getting full visibility on impacted assets for prompt remediation<br> * Instituting threat-prioritized remediation processes to mitigate current and future risks<br><br> This webcast will include a Q&A session with the speaker.
May 24
Countdown to GDPR: Reduce your Risk
Are you thinking about the EU General Data Protection Regulation (GDPR) and the huge potential fines of €20m or 4% of annual worldwide turnover? <br><br> Qualys solutions can help your organisation prepare and comply with GDPR as the 25 May 2018 deadline approaches. <br><br> During this webcast, Jonathan Armstrong, Compliance and Technology Lawyer, Partner at Cordery and Darron Gibbard, Managing Director, EMEA North at Qualys, will answer any compliance questions and highlight the key areas to consider and show you how to know and control your data, assets and suppliers. You will get practical advice on:<br><br> * What you need to focus on: data, assets, suppliers<br> * Who you should involve: key stakeholders and departments<br> * How you can automate processes with Qualys Security Assessment Questionnaire<br><br> This webcast includes a Live Q&A

Training events in addition to the training events automatically added in from GeoLearning.

There are no events at this time.

Loading calendar...

Show only:
Email or call us at +1 800 745 4355 or try our Global Contacts
Subscription Packages
Qualys Solutions
Qualys Community
Free Trial & Tools
Popular Topics