Going Beyond Vulnerability Management with Qualys

Michael Sottile, Information Security Manager, Vantiv

  • Introduction (00:00:00)
  • Going Beyond Vulnerability Management with Qualys_My Background (00:00:14)
  • Going Beyond Vulnerability Management with Qualys_My Company (00:00:47)
  • Fact (00:02:18)
  • The Unknown (00:02:34)
  • You don't know what you don't know. (00:02:58)
  • Informational signatures (blues) can hold a vast wealth of knowledge! (00:03:49)
  • Informational signatures (blues) can hold a vast wealth of knowledge! Server Uptime (00:04:28)
  • Use Case #1: Assessing new Data Centers (00:07:48)
  • Acquisition/New Data Center Insight (00:08:34)
  • Use Case #2: Assisting Audits (00:10:35)
  • Password Settings (00:10:48)
  • Use Case #3: NIDS & Incident Response Tool (00:11:22)
  • Use Case #3: NIDS & Incident Response Tool Cowboy Hunting (00:12:17)
  • Use Case #3: NIDS & Incident Response Tool Source / Destination Identification (00:12:49)
  • Use Case #4: Augmenting Regulatory Compliance (00:14:57)
  • FIM (00:15:48)
  • Q&A (00:16:43)
Introduction