Qualys events.

Opportunities to network and train with Qualys.

  • Unlock New Opportunities with Cloud-Based Workflow Automation for Vulnerability Management Customers

    Jul 24, 2025 8:00 AM – Jul 24, 2025 9:00 AM
    UTC+08:00

    Learn how to upsell advanced cloud runtime security and compliance to your vulnerability management customers—no agents, no disruption Join us for an exclusive partner webinar designed to help you expand your footprint with existing vulnerability management customers by leveraging our latest cloud-based workflow automation capabilities through QFlow. See how it enables you to address critical runtime security and compliance use cases with ease. <b>In this session, you’ll learn how to:</b> <ul><li>Automate cloud-native compliance and policy enforcement across hybrid environments</li><li>Use QFlow’s API-driven automation to track resource ownership and remediate violations in real time</li><li>Upsell and cross-sell to existing vulnerability management customers—no agent required, no disruption to current deployments</li></ul> <b>Date: July 24, 2025 </b> <b>Session 2:</b>8 AM PT / 11 AM ET / 4 PM GMT
  • Unlock New Opportunities with Cloud-Based Workflow Automation for Vulnerability Management Customers

    Jul 24, 2025 9:00 AM – Jul 24, 2025 10:00 AM
    UTC+04:00

    Learn how to upsell advanced cloud runtime security and compliance to your vulnerability management customers—no agents, no disruption Join us for an exclusive partner webinar designed to help you expand your footprint with existing vulnerability management customers by leveraging our latest cloud-based workflow automation capabilities through QFlow. See how it enables you to address critical runtime security and compliance use cases with ease. <b>In this session, you’ll learn how to:</b> <ul><li>Automate cloud-native compliance and policy enforcement across hybrid environments</li><li>Use QFlow’s API-driven automation to track resource ownership and remediate violations in real time</li><li>Upsell and cross-sell to existing vulnerability management customers—no agent required, no disruption to current deployments</li></ul> <b>Date: July 24, 2025 </b> <b>Session 1:</b> 9 AM Dubai (UTC+4)/ 11 AM Singapore (UTC+8)/ 4 PM Sydney (UTC+11)
  • Real-Time Defense for Real Risk: Runtime Threat Detection for Containerized Workloads

    Jul 24, 2025 11:00 AM – Jul 24, 2025 12:00 PM
    UTC-08:00

    In today’s fast-moving cloud environments, threat actors don’t wait for your next scan—they exploit your workloads in real time, often with fileless techniques, tampered binaries, and zero-day malware that bypass traditional defenses. Join us to explore how Qualys brings a <b>risk-first approach</b> to container runtime security—one that goes beyond surface-level detection to help you <b>prioritize and respond to what truly matters</b>. In this session, you'll learn how to: <ul><li><b>Detect live threats with precision:</b> Monitor suspicious process behavior, privilege escalations, and anomalous activity using eBPF-powered detection</li><li><b>Harden containers against tampering:</b> Leverage File Integrity Monitoring (FIM) to detect unauthorized changes to binaries, libraries, and config files</li><li><b>Defend against the unknown:</b> Identify emerging zero-day activity through behavior-based classification and runtime baselining—no signatures required</li><li><b>Take a risk-centric view of threats:</b> Correlate runtime signals with posture, blast radius, and asset context to triage faster and eliminate high-impact risks</li><li><b>Respond with speed and scale:</b> Trigger automated remediation playbooks or orchestrate guided response through the Qualys TruRisk Platform Whether you're dealing with ephemeral workloads or production clusters at scale, this webinar will show you how to operationalize runtime defense—<b>without drowning in noise or adding complexity</b>. </li></ul>
  • Exposing the Hidden Threats: Reinventing Software Composition Analysis for Supply Chain Security

    Jul 28, 2025 11:00 AM – Jul 28, 2025 12:00 PM
    UTC-08:00

    Join Himanshu Kathpal, VP of Product Management at Qualys, for an exclusive webinar on the latest SwCA advancements. Learn how integrated solutions on the Qualys Platform improve visibility, prioritize risk, and boost efficiency to address hybrid environments, alert fatigue, compliance, and supply chain threats. Discover how the 2025 enhancements shift from reactive scanning to proactive defense by linking OSS risks with runtime behavior, business context, and CI/CD activity. This session covers: Qualys experts will present SwCA’s key enhancements, including the industry’s first native VM with deep dependency mapping, smart ticketing for DevOps, living SBOMs, runtime OSS insights, and enterprise-scale management. What you'll learn: <ul><li>Advanced Application-to-Component Mapping: Software Atlas offers precise mapping of applications to their components, revealing complex dependencies and transitive risks, helping teams identify vulnerable libraries impacting critical applications1.</li> <li>Prioritized Risk Remediation: Detailed visibility helps security and development teams focus remediation efforts based on actual business impact, optimizing resource allocation.</li> <li>Streamlined Remediation Workflows: Security teams can assign ticket creation for each affected component directly, integrating with ITSM tools like Jira and ServiceNow, reducing manual work and accelerating risk mitigation.</li> <li>Enhanced Software Transparency: SBOMs improve component transparency and provenance, aiding compliance and building trust across the software ecosystem2.</li> <li>Scalable Enterprise Management: Advanced query tokens and expanded OSS visibility support global DevSecOps operations at scale.</li></ul> Learn how Qualys SwCA helps secure software delivery, strengthen supply chain resilience, and reduce risk. Join the webinar for practical DevSecOps insights and stay ahead of evolving threats.
  • Exposing the Hidden Threats: Reinventing Software Composition Analysis for Supply Chain Security

    Jul 28, 2025 11:00 AM – Jul 28, 2025 12:00 PM
    UTC-08:00

    Join Himanshu Kathpal, VP of Product Management at Qualys, for an exclusive webinar on the latest SwCA advancements. Learn how integrated solutions on the Qualys Platform improve visibility, prioritize risk, and boost efficiency to address hybrid environments, alert fatigue, compliance, and supply chain threats. Discover how the 2025 enhancements shift from reactive scanning to proactive defense by linking OSS risks with runtime behavior, business context, and CI/CD activity. This session covers: Qualys experts will present SwCA’s key enhancements, including the industry’s first native VM with deep dependency mapping, smart ticketing for DevOps, living SBOMs, runtime OSS insights, and enterprise-scale management. What you'll learn: <ul><li>Advanced Application-to-Component Mapping: Software Atlas offers precise mapping of applications to their components, revealing complex dependencies and transitive risks, helping teams identify vulnerable libraries impacting critical applications1.</li> <li>Prioritized Risk Remediation: Detailed visibility helps security and development teams focus remediation efforts based on actual business impact, optimizing resource allocation.</li> <li>Streamlined Remediation Workflows: Security teams can assign ticket creation for each affected component directly, integrating with ITSM tools like Jira and ServiceNow, reducing manual work and accelerating risk mitigation.</li> <li>Enhanced Software Transparency: SBOMs improve component transparency and provenance, aiding compliance and building trust across the software ecosystem2.</li> <li>Scalable Enterprise Management: Advanced query tokens and expanded OSS visibility support global DevSecOps operations at scale.</li></ul> Learn how Qualys SwCA helps secure software delivery, strengthen supply chain resilience, and reduce risk. Join the webinar for practical DevSecOps insights and stay ahead of evolving threats.
  • Webinar: Code to Cloud Risk – A Unified Security Perspect

    Jul 30, 2025 11:00 AM – Jul 30, 2025 12:00 PM
    UTC+05:30

    As organizations scale cloud-native development, security teams face an increasingly fragmented threat landscape—spread across code, workloads, containers, and runtime environments. It's no longer enough to secure isolated components. A unified, risk-centric approach is the key to defending modern cloud infrastructure. In this expert-led session, we’ll break down how to build a connected cloud security strategy that delivers full visibility, reduces alert fatigue, and helps prioritize what truly matters—from development to deployment and beyond. <b>What You'll Learn</b> <ul><li><b>Align Kubernetes Security Posture Management (KSPM)</b> with your broader cloud governance framework to proactively minimize misconfigurations and policy drift.</li><li><b>Secure dynamic environments</b> with real-time <b>Container Runtime Security, </b>addressing active threats before they escalate.</li><li><b>Visualize and prioritize risks</b> with <b>Attack Path Analysis</b> to uncover the real exposure chain across assets, users, and applications.</li><li><b>Cut through alert noise</b> using <b>contextual risk insights,</b> enabling smarter decisions and focused remediation efforts.</li></ul> <b>Who Should Attend</b> <ul><li>Cloud Security Architects</li><li>DevSecOps Professionals</li><li>IT Risk & Compliance Leaders</li><li>Infrastructure & Operations Teams</li><li>Security Engineers focused on Cloud & Container Environments</li></ul> <b>Why Attend</b> <ul><li>Gain a practical, end-to-end view of securing cloud-native applications</li><li>Learn how to break silos across tools and teams</li><li>Discover actionable strategies to strengthen security posture across CI/CD pipelines</li></ul> <b>Secure your spot today</b> Seats are limited. Reserve your place and take the next step in building a resilient, cloud-native security program.
  • Webinar: Code to Cloud Risk – A Unified Security Perspective

    Jul 30, 2025 11:00 AM – Jul 30, 2025 12:00 PM
    UTC+05:30

    As organizations scale cloud-native development, security teams face an increasingly fragmented threat landscape—spread across code, workloads, containers, and runtime environments. It's no longer enough to secure isolated components. A unified, risk-centric approach is the key to defending modern cloud infrastructure. In this expert-led session, we’ll break down how to build a connected cloud security strategy that delivers full visibility, reduces alert fatigue, and helps prioritize what truly matters—from development to deployment and beyond. <b>What You'll Learn</b> <ul><li><b>Align Kubernetes Security Posture Management (KSPM)</b> with your broader cloud governance framework to proactively minimize misconfigurations and policy drift.</li><li><b>Secure dynamic environments</b> with real-time <b>Container Runtime Security, </b>addressing active threats before they escalate.</li><li><b>Visualize and prioritize risks</b> with <b>Attack Path Analysis</b> to uncover the real exposure chain across assets, users, and applications.</li><li><b>Cut through alert noise</b> using <b>contextual risk insights,</b> enabling smarter decisions and focused remediation efforts.</li></ul> <b>Who Should Attend</b> <ul><li>Cloud Security Architects</li><li>DevSecOps Professionals</li><li>IT Risk & Compliance Leaders</li><li>Infrastructure & Operations Teams</li><li>Security Engineers focused on Cloud & Container Environments</li></ul> <b>Why Attend</b> <ul><li>Gain a practical, end-to-end view of securing cloud-native applications</li><li>Learn how to break silos across tools and teams</li><li>Discover actionable strategies to strengthen security posture across CI/CD pipelines</li></ul> <b>Secure your spot today</b> Seats are limited. Reserve your place and take the next step in building a resilient, cloud-native security program.
  • Are you ready to transform security with a Risk Operations Center (ROC)?

    Jul 31, 2025 11:00 AM – Jul 31, 2025 12:00 PM
    UTC-08:00

    Are you ready for a Risk Operations Center (ROC)? In today’s fast-moving digital world, risk is everywhere—expanding attack surfaces, mounting regulatory pressure, and the ever-present threat of costly disruptions. Traditional, siloed approaches to risk management are no longer enough. The Risk Operations Center (ROC) offers a new path forward: a unified, business-aligned command center that transforms risk from a technical headache into a strategic advantage. Join us for this essential webinar to discover what a ROC is, why it matters now, and how it can empower your organization to anticipate threats, drive efficiency, and deliver clarity at every level. We’ll break down the core pillars of a modern ROC, including Money-Minded CTEM, business-aligned risk management, operational efficiency, and comprehensive risk surface mastery. You’ll gain practical insights into how leading organizations are achieving fewer incidents, faster response, and stronger collaboration—turning risk into a catalyst for growth. Who should attend: <ul><li>Security leaders and CISOs seeking a proactive risk strategy</li> <li>IT, operations, and compliance professionals aiming for streamlined, business-driven outcomes</li> <li>Executives looking to align security investments with organizational goals</li></ul> What you’ll learn: <ul><li>Why traditional risk management falls short in today’s landscape</li> <li>The foundational elements and benefits of a ROC</li> <li>How to start your ROC journey and what outcomes you can expect</li></ul> Take the next step in transforming your approach to risk—join us and see if your organization is ready for a Risk Operations Center
  • Patch Tuesday Webinar August 2025: This Month in Vulnerabilities and Patches

    Aug 14, 2025 10:00 AM – Aug 14, 2025 11:00 AM
    UTC-08:00

    Please join the Qualys research and product teams for the “This Month in Vulnerabilities and Patches” webinar on August 14, 2025. We will discuss this month's high-impact vulnerabilities, including those that are part of July 2025 Patch Tuesday. We will walk you through the steps to address the key vulnerabilities using Qualys VMDR and Patch Management. We will cover: • The significant vulnerabilities published this month: • Microsoft Patch Tuesday, July 2025 • Other Significant Vulnerabilities An action plan to quickly identify and remediate vulnerabilities: • Learn how to use Qualys Patch Management to remediate vulnerabilities.
  • Patch Tuesday Webinar September 2025: This Month in Vulnerabilities and Patches

    Sep 11, 2025 10:00 AM – Sep 11, 2025 11:00 AM
    UTC-08:00

    Please join the Qualys research and product teams for the “This Month in Vulnerabilities and Patches” webinar on September 11, 2025. We will discuss this month's high-impact vulnerabilities, including those that are part of August 2025 Patch Tuesday. We will walk you through the steps to address the key vulnerabilities using Qualys VMDR and Patch Management. We will cover: • The significant vulnerabilities published this month: • Microsoft Patch Tuesday, August 2025 • Other Significant Vulnerabilities An action plan to quickly identify and remediate vulnerabilities: • Learn how to use Qualys Patch Management to remediate vulnerabilities.
  • Ireland Roadshow

    Sep 17, 2025 – Sep 18, 2025
    Hilton Dublin
    Dublin
    Ireland
  • Cloud Security Alliance

    Sep 18, 2025 – Sep 19, 2025
    Kinepolis Ciudad de la Imagen
    Madrid
    Spain
  • Digital Growth Summit

    Sep 30, 2025 – Oct 1, 2025
    High Tech Campus 1
    Eindhoven
    Netherlands
  • Scotland Roadshow Event

    Oct 8, 2025 – Oct 9, 2025
    DoubleTree by Hilton Edinburgh City Centre
    Edinburgh, Scotland
    United Kingdom
  • QSC Americas 2025

    Oct 13, 2025 – Oct 17, 2025
    JW Marriott Houston at The Galleria
    Houston, TX
    United States
  • Patch Tuesday Webinar October 2025: This Month in Vulnerabilities and Patches

    Oct 16, 2025 10:00 AM – Oct 16, 2025 11:00 AM
    UTC-08:00

    Please join the Qualys research and product teams for the “This Month in Vulnerabilities and Patches” webinar on October 16, 2025. We will discuss this month's high-impact vulnerabilities, including those that are part of September 2025 Patch Tuesday. We will walk you through the steps to address the key vulnerabilities using Qualys VMDR and Patch Management. We will cover: • The significant vulnerabilities published this month: • Microsoft Patch Tuesday, September 2025 • Other Significant Vulnerabilities An action plan to quickly identify and remediate vulnerabilities: • Learn how to use Qualys Patch Management to remediate vulnerabilities.
  • Patch Tuesday Webinar November 2025: This Month in Vulnerabilities and Patches

    Nov 13, 2025 10:00 AM – Nov 13, 2025 11:00 AM
    UTC-08:00

    Please join the Qualys research and product teams for the “This Month in Vulnerabilities and Patches” webinar on November 13, 2025. We will discuss this month's high-impact vulnerabilities, including those that are part of October 2025 Patch Tuesday. We will walk you through the steps to address the key vulnerabilities using Qualys VMDR and Patch Management. We will cover: • The significant vulnerabilities published this month: • Microsoft Patch Tuesday, October 2025 • Other Significant Vulnerabilities An action plan to quickly identify and remediate vulnerabilities: • Learn how to use Qualys Patch Management to remediate vulnerabilities.
  • Patch Tuesday Webinar December 2025: This Month in Vulnerabilities and Patches

    Dec 11, 2025 10:00 AM – Dec 11, 2025 11:00 AM
    UTC-08:00

    Please join the Qualys research and product teams for the “This Month in Vulnerabilities and Patches” webinar on December 11, 2025. We will discuss this month's high-impact vulnerabilities, including those that are part of November 2025 Patch Tuesday. We will walk you through the steps to address the key vulnerabilities using Qualys VMDR and Patch Management. We will cover: • The significant vulnerabilities published this month: • Microsoft Patch Tuesday, November 2025 • Other Significant Vulnerabilities An action plan to quickly identify and remediate vulnerabilities: • Learn how to use Qualys Patch Management to remediate vulnerabilities.