Going Beyond Vulnerability Management with Qualys
Michael Sottile, Information Security Manager, Vantiv
- Introduction (00:00:00)
- Going Beyond Vulnerability Management with Qualys_My Background (00:00:14)
- Going Beyond Vulnerability Management with Qualys_My Company (00:00:47)
- Fact (00:02:18)
- The Unknown (00:02:34)
- You don't know what you don't know. (00:02:58)
- Informational signatures (blues) can hold a vast wealth of knowledge! (00:03:49)
- Informational signatures (blues) can hold a vast wealth of knowledge! Server Uptime (00:04:28)
- Use Case #1: Assessing new Data Centers (00:07:48)
- Acquisition/New Data Center Insight (00:08:34)
- Use Case #2: Assisting Audits (00:10:35)
- Password Settings (00:10:48)
- Use Case #3: NIDS & Incident Response Tool (00:11:22)
- Use Case #3: NIDS & Incident Response Tool Cowboy Hunting (00:12:17)
- Use Case #3: NIDS & Incident Response Tool Source / Destination Identification (00:12:49)
- Use Case #4: Augmenting Regulatory Compliance (00:14:57)
- FIM (00:15:48)
- Q&A (00:16:43)