Agenda

Kick off QSC21 on Tuesday, November 16, 6:00 PM – 9:00 PM with a social evening. Meet old friends, make new ones, enjoy cocktails, and connect with Qualys experts and peers.

Training Sessions

Conference Sessions

7:30 – 9:00 AM Registration & Breakfast
9:00 – 9:10 AM Welcome
9:10 – 10:10 AM Industry Expert Keynote: Defend Today, Secure Tomorrow
Chris Krebs, Former Director for the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA)

Chris Krebs' bio

Chris Krebs, former U.S. director of the Cybersecurity and Infrastructure Security Agency (CISA), will discuss the current threat landscape and how the rapid growth in connected devices widens the attack surface seemingly giving adversaries an upper hand. Yet, all is not lost as the industry can fight back, but it requires a shift in thinking regarding defense along with increased cooperation between the private sector and the government.

10:10 – 11:10 AM Security Automation for the Digital Journey
Sumedh Thakar, President and CEO, Qualys

Sumedh Thakar’s bio

With cyberattack severity and volume growing exponentially, it’s time to step up our defenses by integrating automation into our cybersecurity arsenal. Automation can save resources, time, and money if we as an industry get over our reluctance to implement it.

Sumedh will discuss the pressing need for enterprises to automate specific aspects of cybersecurity and the steps companies can take to implement automation in low-risk, high-reward situations freeing up IT and Security teams to concentrate on more strategic activities.

11:10 – 11:30 AM Break
11:30 AM – 12:30 PM Bringing the Unified Power of the Enterprise TruRisk Platform to Address Today’s Security Challenges
Shailesh Athalye, Senior Vice President, Product Management, Qualys

Shailesh Athalye’s bio

Using multiple siloed tools is ineffective in defending against multi-vector attacks, not scalable for perimeter-less environments, and not auditable for stringent compliance mandates. Instead of concentrating on important tasks, security teams expend too much time and effort operationalizing security toolsets. This session will share the power of Qualys’ unified platform for context-driven security, including recent updates, next-gen initiatives, and lively demos. You will learn:

  • How the Enterprise TruRisk Platform provides a unified security approach, enabling organizations to extend foundational security controls to hybrid environments with multiple sensors
  • Recent product updates for enabling prevention as well as detection and response strategies – including managing asset inventory, remediating using threat context, detection and response using prevention context, and streamlining compliance management
  • Next-gen initiatives to automate the labor-intensive operational processes necessary to get insights out of security tooling using no-code, zero-touch orchestration suited for your environment
12:30 – 1:45 PM Lunch
1:45 – 2:45 PM TRACK: Asset Management Reimagined for Security
Constantine Vorobetz, Product Manager, Assets & Reporting, Qualys
Todd Sherinian, Sr. Manager Global Cyber Operations, Circle K

Constantine Vorobetz’s bio

Session 1

Topic 1: Asset Risk Management – Ground Zero for Security

Traditional IT inventory tools focus on visibility but fail to deliver information relevant to improving your organization’s security posture. Qualys has reimagined asset management, enabling cybersecurity teams to:

  • Apply business criticality and risk context to monitor asset health for end-of-life (EOL) or the absence of security tooling
  • Detect security risks, including at-risk software and assets exposed to the internet
  • Prioritize vulnerabilities and rapidly respond to reduce ‘threat debt’

Topic 2: Deep Visibility via Two-Way CMDB Integration

Discover how two-way sync between CMDBs and Qualys helps organizations maintain a complete, unified, and up-to-date asset visibility foundation across IT and security:

  • Improve security programs with contextualized intelligence such as asset ownership, the asset’s environment, business criticality, and more
  • Drive better processes and collaboration across IT and security teams

Topic 3: Prioritizing Risks Within a Contextual Framework

The variety and ever-changing nature of corporate assets make the task of controlling security in modern environments difficult and complex. Security teams need to prioritize prevention and detection/response strategies based on asset criticality and risks. Learn how to:

  • Leverage asset risk prioritization and response workflows
  • Maintain asset health in order to reduce security risks
  • Gain and maintain compliance with industry standards like PCI and FedRAMP
Session 2

Customer Session: Circle K

2:45 – 3:45 PM TRACK: Next-Gen Vulnerability Management Program
Mehul Revankar, VP Product Management and Engineering for VMDR, Qualys
Eran Livne, Director, Product Management, Endpoint Remediation, Qualys
Sara J. Griffith, Chief Information Security Officer, Euronet Worldwide

Mehul Revankar’s bio
Eran Livne’s bio

Session 1

Topic 1: Elevating Vulnerability Management Programs With Integrated Risk Context

If you fail to prioritize the most tempting vulnerabilities, attackers will prioritize them for you. Attacks will follow. With today’s hybrid infrastructure, prioritizing vulnerabilities based on ransomware risks can be a daunting task, requiring an in-depth understanding of targeted assets, their vulnerabilities, and associated threats. Once understood, reducing risk requires balancing the needs of people, processes and technology. A new, integrated approach from Qualys can help organizations:

  • Discover assets, then find and prioritize vulnerabilities based on their risk profile
  • Deliver closed-loop remediation from a single platform

Topic 2: Improving Time to Remediation With Integrated Patch Management

Organizations are struggling to efficiently remediate the ever-increasing number of newly detected vulnerabilities in a timely manner. Learn how Qualys Patch Management can:

  • Help organizations optimize and, when possible, automate the remediation process
  • Aid efficient remediation of all types of vulnerabilities, saving time and effort

Topic 3: Sharing Common Vulnerability Visibility Between IT and Security Teams With Integrated ITSM

Ideally, once a critical security vulnerability is found it should be remediated by IT and Security teams working hand in glove to eliminate it. Easier said than done. Disparate toolsets, misaligned workflows, and competing priorities often get in the way, exposing the business to unnecessary risk. Effective vulnerability management requires better collaboration not only between IT and Security teams, but also between the respective toolsets they employ. Learn how Qualys can integrate with existing ITSM workflows, such as ServiceNow, enabling you to:

  • Collaborate more effectively to improve your vulnerability remediation efforts
  • Prioritize the right set of vulnerabilities, assign them to the right groups, and track them all the way to closure
Session 2

Customer Session: Euronet Worldwide Coordinated Global Response to Cyber Threats

Sara Griffith, CISO, Euronet Worldwide, Inc.

What does an organization do when it needs to improve threat insight, visibility, and detection of threats on widely distributed assets but is struggling with manual processes and systems that slow its response? Hear how this global payments processor safeguarded its business from the risk of cyberattacks with a central, real-time view of vulnerabilities across all IT assets.

3:45 – 4:00 PM Break
4:00 – 5:00 PM TRACK: Always Audit-Ready With Continuous Compliance Management
Hariom Singh, Director Compliance Solutions, Qualys
Parveen Malik, VP, Information Security, U.S. Financial Services Company

Hariom Singh’s bio

Session 1

Topic 1: Go Beyond Compliance With Secure Configuration Management

To stay ahead of cyber threats, organizations need to be proactive in securing configurations across hybrid IT systems. Misconfigurations continue to be a leading cause of data breaches and ransomware attacks. Qualys Policy Compliance makes it much easier to meet your compliance requirements. Learn how you can:

  • Establish and maintain a solid cybersecurity foundation that goes beyond compliance, reduces the attack surface, and bolsters your security posture against cyber threats including ransomware
  • Comply with nearly all regulatory requirements and frameworks such as SOC 2, PCI-DSS, HIPAA, GDPR, ISO27001, NIST 800 53, NIST CSF, and other global mandates

Topic 2: How FIM Cancels the Noise to Detect Changes and Ease PCI Compliance

All security incidents can be attributed to some type of change (or lack thereof) on a system. The continuous monitoring and detection of changes within systems helps maintain their integrity while effectively managing ongoing system changes. Learn how Qualys File Integrity Monitoring (FIM) can help:

  • Eliminate alert fatigue with “noise canceling” change detection
  • Get ahead of cyber threats before costly data breaches or other security events occur
  • Meet your compliance requirements for regulatory standards such as PCI DSS, HIPAA, and SOX

Topic 3: Turbocharge Cloud Agent With Custom Data Collection and Rapid Response

IT and Security teams need to quickly develop scripts to accomplish on-demand and repetitive tasks driven by security threats and demand for audits and investigations. The result? A cache of scripts scattered across your organization with no central method for script execution or management. Discover how to:

  • Centralize and operationalize custom scripts for real-time assessment using a single Qualys Cloud Agent with Qualys Script Central
Session 2

Customer Session: U.S. Financial Services Company

Parveen Malik, VP, Information Security, U.S. Financial Services Company
5:00 – 5:15 PM Day 1 Closing Remarks
6:15 – 7:15 PM Cocktails
Register

Day 2 Agenda

Sumedh Thakar

Sumedh Thakar

President and CEO, Qualys

As President and CEO, Sumedh leads the company’s vision, strategic direction and implementation. He joined Qualys in 2003 in engineering and grew within the company, taking various leadership roles focused on helping Qualys deliver on its platform vision. From 2014 to 2021, he served as Qualys’ Chief Product Officer, where he oversaw all things product, including engineering, development, product management, cloud operations, DevOps, and customer support. A product fanatic and engineer at heart, he is a driving force behind expanding the platform from Vulnerability Management into broader areas of security and compliance, helping customers consolidate their security stack. This includes the rollout of the game-changing VMDR (Vulnerability Management, Detection and Response) that continually detects and prevents risk to their systems, Multi-Vector EDR, which focuses on protecting endpoints as well as Container Security, Compliance and Web Application Security solutions. Sumedh was also instrumental in the build-up of multiple Qualys sites resulting in a global 24x7 follow-the-sun product team.

Sumedh is a long-time proponent of SaaS and cloud computing. He previously worked at Intacct, a cloud-based financial and accounting software provider. He also worked at Northwest Airlines developing complex algorithms for its yield and revenue management reservation system. Sumedh has a bachelor’s degree in computer engineering with distinction from the University of Pune.

Jimmy Graham

Jimmy Graham

Sr. Director of Product Management, Qualys

Jimmy Graham is the Sr. Director of Product Management for Vulnerability Management. He has been deeply involved in information security and vulnerability management for over 10 years, and has managed teams covering security operations, incident response, application security, vulnerability management, penetration testing, governance, and compliance.

Asif Awan

Asif Awan

CTO of Container Security

Asif is a passionate cybersecurity entrepreneur with a broad business and technology expertise that spans enterprise, healthcare and financial domains, and cloud, mobile and deep learning technologies. He was the founder and CTO of Layered Insight till it was acquired recently by Qualys. He is now the CTO for Container Security at Qualys. Layered Insight was a pioneer in the container security space that offered a solution for providing deep visibility and protection for containerized and serverless workloads, using an innovative application-centric approach. It's the only infrastructure and orchestration agnostic solution that's zero-touch to developers and DevOps, and fully portable for cloud and edge workloads.

Asif is a pioneer in the Mobile Application Management space. Back in 2011, he identified a serious gap in the enterprise solutions being offered for BYOD, envisioned an innovative user-space virtualization solution, and founded Plursona to build that solution and realize the business vision. Plursona was acquired in 2012 by HPE (Aruba Networks) for its best-in-class technology. Asif has held various technology and business leadership positions at HPE (Aruba Networks), Motorola Mobility, Wells Fargo, Juniper Networks and Boston Scientific (Guidant).

Dave Ferguson

Dave Ferguson

Director of Product Management, Qualys

Dave Ferguson is Director of Product Management for Web Application Security at Qualys. After writing code and developing applications for over a decade, Dave transitioned to focus on application security. Prior to Qualys, he led the global application security program at Sabre Corporation and worked as a Principal Consultant at FishNet Security (now Optiv). Dave is author of the OWASP Forgot Password Cheat Sheet and holds CISSP and CSSLP certifications.

Asif Karel

Director of Product Management, Qualys

Asif Karel is the director of product management for Qualys CertView. He has over 20 years of experience in Information Security including online fraud detection, PKI, strong authentication and single sign-on. Prior to joining Qualys, he was a subject matter expert in digital certificates and certificate solutions at VeriSign and Symantec, a solutions architect in the CASB space at CipherCloud and a solutions manager at Venafi.

Chris Carlson

Chris Carlson

VP of Strategy, Qualys

Chris Carlson is a vice president of strategy at Qualys, where he is in charge of the product definition, roadmap and strategy for the Cloud Agent Platform. During his 20+ year career in the infosec industry, Carlson has attained expertise in multiple areas, ranging from firewalls, VPNs and intrusion prevention systems to real-time event-processing, security analytics and next-generation endpoint platforms. Prior to joining Qualys, he held security architecture roles at UBS and at Booz Allen Hamilton, and product management positions at venture-funded startups and at leading vendors, including Hexis Cyber Solutions, Agent Logic, Informatica and Trustwave.

Shailesh Athalye

Shailesh Athalye

Senior Vice President, Product Management, Qualys

As Senior Vice President of Product Management, Shailesh leads the product management team and drives the Qualys product vision helping customers assess and improve their IT, security and compliance posture. Since joining Qualys in 2012, he has worked in various security and compliance roles driving innovative solutions, including remote endpoint protection, endpoint detection and response, and SaaS security. In addition, Shailesh headed engineering, research and product management for Qualys Policy Compliance and File Integrity Monitoring, where he helped customers go beyond compliance to drive their IT GRC objectives. Before Qualys, he focused on security research for Symantec ESM and Compliance solutions. Shailesh holds a master’s in computer applications (MCA) from the Vishwakarma Institute of Technology and has various security certifications including CISA, CRISC, CISM. He is also a regular speaker at industry conferences.

Pablo Quiroga

Director of Product Management, Qualys

Pablo Quiroga is a Director of Product Management at Qualys, where he is in charge of the product definition, roadmap and strategy for the IT asset visibility & management initiatives. With over 10 years of experience in Enterprise Software and the IT industry, Pablo has helped numerous customers gain significantly better visibility to support data-powered decision that often led to multi-million-dollar savings and risk avoidance.

Hari Srinivasan

Hari Srinivasan

Director of Product Management, Qualys

Hari Srinivasan is director of product management for Qualys’ security for cloud and virtualization. He has expertise in numerous enterprise software disciplines including cloud security and analytics, automation, systems management, data center transformation, Hybrid Cloud, PaaS - DBaaS, compliance and configuration management. He previously worked at Oracle both as an engineer and spent over a decade in multiple areas in product management positions.

Scott Crawford

Scott Crawford

Research Director, Information Security, S&P Global Market Intelligence

Scott Crawford is Research Director of the Information Security practice S&P Global Market Intelligence, where he leads coverage of emerging trends, innovation and disruption in the information security market. Scott is the former CISO of the Comprehensive Nuclear-Test-Ban Treaty Organization’s International Data Centre in Vienna, Austria, where he pioneered security initiatives for an NGO serving more than 150 nations. He has served in IT and security technology roles at the University Corporation for Atmospheric Research, with Emerson, and as a security strategist at IBM.​

Richard A. Clarke

Richard A. Clarke

National Security and Cyber Risk Expert, Author of The Fifth Domain

The Cyber War and You

Richard A. Clarke is a former key advisor on intelligence and counter-terrorism who worked during the administrations of Presidents Ronald Reagan, George H. W. Bush, and Bill Clinton. Starting in 1998, he also served as the National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the U.S. National Security Council.

In The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats, Clarke and fellow cybersecurity expert Robert K. Knake provide a vivid, engrossing tour of cyberspace, introducing us to the scientists, executives, and public servants who have learned through hard experience how government agencies and private firms can fend off cyber threats.

Upon leaving the Bush administration in 2003, Clarke began speaking about his experience and future predictions about intelligence and counter-terrorism. He is an on-air ABC News consultant on political and security issues, and lectures at the John F. Kennedy School of Government at Harvard University. Clarke has appeared on Real Time with Bill Maher, The Daily Show, The Colbert Report, CNN, and more, where he has spoken about cyber war, crisis management, terrorism, the Middle East, and other major political issues of our time. Additionally, Clarke has written several op-eds on these subjects for the New York Times, the Washington Post, and the Wall Street Journal. His 2018 podcast, Future State, discussed the issues crucial to voters in the weeks preceding the election with such high-profile guests as former Secretary Madeleine Albright and former President Bill Clinton.

Clarke currently chairs the Board of Governors of the Middle East Institute. He has written nine books, both fiction and nonfiction, including the #1 New York Times bestseller Against All Enemies: Inside America’s War on Terror.

Dilip Bachwani

Dilip Bachwani

Senior Vice President, Engineering and Cloud Operations, Qualys

Dilip Bachwani is Senior Vice President, Engineering and Cloud Operations at Qualys, responsible for spearheading Qualys’ Cloud Platform Engineering, DevOps and SRE initiatives. An Agile and DevOps champion passionate about its transformational potential on organizational productivity and success, Dilip has deep technology and architecture expertise and over 18 years experience in building complex scalable distributed systems.

Laurie MacCarthy

Laurie MacCarthy

EVP Worldwide Field Operations, Qualys

Laurie leads the worldwide field operations teams. In this role, she works with all regional leaders to provide customers with solutions that help them secure their digital transformation efforts. She also builds technology partnerships with customers that guide and shape the direction and vision of the Enterprise TruRisk Platform. In addition, Laurie ensures that the field teams provide the highest level of technical support to customers – ensuring maximum performance and results from the deployment of Qualys solutions.

Laurie has 22 years of experience in the IT industry, with a focus on information security for the past 12 years. Before joining Qualys in 2012, she managed the vulnerability program for CVS Caremark. Laurie has also program managed strategic initiatives at various security companies, including SecureWorks and VeriSign.

Charles Henderson

Charles Henderson

Global Head of IBM X-Force Red

Charles Henderson is the Managing Partner and Global Head of X-Force Red. Throughout his career, Charles and the teams he has managed have specialized in network, application, physical, and hardware/device penetration testing as well as vulnerability research. X-Force Red’s clients range from the largest on the Fortune lists to small and midsized companies interested in improving their security posture.

Charles is also an enthusiastic member of the information security community and an advocate of vulnerability research. He has been a speaker at various conferences (including Black Hat, DEFCON, RSA, SOURCE, OWASP AppSec USA and Europe, and SXSW) around the world on various subjects relating to security testing and incident response. He has also appeared on or in The Today Show, CBS Evening News, CNN, Fox News, MSNBC, BBC, The Wall Street Journal, Forbes, USA Today, The Register, SC Magazine, Engadget, eWeek, Reuters, Car & Driver, and various other media outlets.

Badri Raghunathan

Badri Raghunathan

Director of Product Management, Qualys

Badri Raghunathan is a director of product management at Qualys, responsible for spearheading Qualys’ product initiatives around cloud-native infrastructure (containers, serverless). A technology entrepreneur at heart, Badri thrives on understanding customer problems, building differentiated products, and taking them to market. Badri has worked in product and engineering management roles in a variety of industries, including security, networking and consumer electronics. Most recently, Badri was a founder at an early stage cloud DevSecOps startup, and prior to that, he led cloud-based security and networking products at companies like Symantec and Cisco. Badri holds 9 U.S. patents and has several more applications in the pipeline. He holds an MBA from the University of California Berkeley, and M.S. and B.S. degrees in electrical engineering from Oklahoma State University and the University of Madras, respectively.

Chris Rodgers

Chris Rodgers

Director of Product Management, Qualys

Chris Rodgers is a director of product management, vulnerability detection and response, at Qualys. Chris has more than 15 years of experience in technology and information security. Previously, he was an information security engineer in charge of vulnerability management at Western Union, and before that, he held business and technical roles at Arrow Electronics and Ryerson. He holds a master’s degree in organizational leadership from the University of Denver and a bachelor’s degree in leadership development from Texas A&M University.

Wendy M. Pfeiffer

Wendy M. Pfeiffer

CIO, Nutanix

As the CIO of Nutanix, Wendy's focus on enterprise adoption of modern technologies fuels the company's global mission. Wendy also serves on the boards of Qualys, Inc. and Girls In Tech. A consumer tech enthusiast, Wendy has led technology and operational functions for Robert Half, GoPro, Yahoo! and Cisco. Wendy's recent accolades include being named ORBiE's Bay Area Enterprise CIO of the Year, the Fisher Center for Data Analytics' CIO of the Year, and one of HMG's Top Technology Executives. She was also ranked first on Enterprise Management 360's list of Top 10 Tech CIO's, named one of Silicon Valley Business Journal's Women of Influence and listed as one of the National Diversity Council's Top 50 Most Powerful Women in Technology.

Ramesh Chinta

Ramesh Chinta

Group Program Manager, Microsoft

Ramesh Chinta is a group program manager and seasoned leader at Microsoft. During his tenure, he has built protocols and the storage stack for the Exchange Server and security authentication, authorization, and management services for Windows. He has experience managing Bing infrastructure services to operate systems and security at scale. In his current role, he manages Azure Security and Compliance in the security health and analytics areas. Ramesh is responsible for the security services in the Azure Security Center. He is an expert in cloud security, delivering cloud services at hyperscale, distributed systems, security health, and analytics domains and holds multiple patents in these areas.

Senthil Selvaraj

Senthil Selvaraj

SVP Independent Technology Risk, PNC Bank

Senthil Selvaraj is a risk and technology executive in the banking industry. He is currently with PNC Bank as the second line risk lead supporting CIO groups. Previously, Senthil was with Bank of America in multiple technology, consumer and risk roles. His focus is on technology infrastructure, data center modernization (which includes vulnerability, change, and testing aspects associated with vendor products), and impact on artificial intelligence for banking applications.

Brian Rossi

Brian Rossi

Sr. Security Manager Vulnerability Management, Caterpillar

Brian Rossi has been a cybersecurity leader at Caterpillar for the past 5 years focusing on IAM best practices and vulnerability management. Prior to this role, Brian spent 15 years integrating IT operations into service management through automation to bring greater efficiency to the business. Now leveraging his passion for automation and cybersecurity, he is helping to securely enable the Caterpillar supply chain through effective technology integrations.

Grant Johnson

Grant Johnson

Director of Risk and Compliance, Ancestry

Grant Johnson is the Director of Risk and Compliance at Ancestry where he is responsible for a team that manages all things IT compliance, including: GDPR Privacy Controls, Payment Card Industry (PCI) reporting, Cloud Security compliance & control and Vulnerability Management. He started his career with the Big Four accounting firms and has worked in different industries since then. He has been involved with IT security and compliance for over 20 years. Vulnerability management has been a favorite pass-time of his since he took over responsibility for scanning an entire Class A sized network at General Electric and regularly involved in working through the challenges posed by scanning over 900K hosts. He most recently developed the scanning and vulnerability operations process to meet the unique needs of the cloud-based infrastructure at Ancestry. When he is not at work, he loves spending time under the hood of a car and suffering chronic seasonal mood disorder induced by following BYU’s football team.

John Njenga

John Njenga

Principal Security Engineer, IT Security Engineering - VMP, Fortune Global 50 Retailer

John Njenga current lives within the Atlanta metro area and has been working as an IT professional for more than 25 years. He has held various roles in software development, IT systems and network engineering, technical management, and IT security risk and compliance within the IT technology, engineering, banking and finance, security consulting, and retail industries. He is currently employed as a Principal Security Engineer within the cybersecurity risk and engineering space for a Fortune 50 retailer based in the Southeast United States.

Chad Schieken

Chad Schieken

Executive Director Cyber Exposure Management, Comcast

Chad Schieken has over 20 years of professional experience in cybersecurity in a variety of settings. His primary areas of competency include cloud security, privacy, compliance and vulnerability management. Having worked at both a large public cloud provider and one of the leading incident response firms, Chad has had a unique opportunity to see how leading organizations address today’s challenges. Chad is from Philadelphia, PA where he lives safely tucked away with his wife, 4 children and their dog, Winston.

Thomas Graham

Thomas Graham

CISO, CynergisTek

Thomas Graham serves as the CISO for CynergisTek, a top Healthcare Security company based in Austin, Texas. Prior to this, he supported the Defense Health Agency in a variety of roles. Most recently, prior to working with CynergisTek, his team received a FedHealthIT award for innovation presented at the National Press Club in Washington, DC. He currently holds MBA and MS-Technology Systems degrees, along with being in the final stages of his PhD in Information Assurance. Thomas has received CISSP and HCISPP designations, along with other industry recognized certifications. Thomas also serves on the MIS advisory board for East Carolina University and has spoken at multiple industry-recognized conferences.

Andrei Hotaran

Andrei Hotaran

Director of Security and Emerging Technologies, Celestica

As an enterprise architect at Celestica, Andrei Hotaran focuses on security strategy and technology innovation. He brings more than 20 years of Information Technology experience spanning across application development, cloud technologies, machine learning and cybersecurity.

Geronimo Welter Lapinig

Geronimo Welter Lapinig

IT System Specialist, Celestica

Geronimo Welter E. Lapinig is a senior developer with 14 years of experience in information technology and part of Celestica's Global Shopfloor application development team. His role is to ensure seamless and secure deployment of applications across all Celestica sites whether on premise or in the cloud.

Hemanta Swain

Hemanta Swain

VP & Chief Information Security Officer, TiVo Corporation

Hemanta Swain is the VP & Chief Information Security Officer at TiVo Corp, headquartered in San Jose, California. TiVo is a global leader in entertainment technology and creator of Digital Video Recorder, and holds 6,000+ patents worldwide. Hemanta leads a global team of security professionals to manage cybersecurity, regulatory compliance, privacy and risk management initiatives across the company. Hemanta has more than 22 years of IT experience including greater than 15 years of cybersecurity and risk management expertise. Hemanta has held multiple roles at TiVo. Prior to joining TiVo, Hemanta held various security technical leadership roles for companies like GE and Wipro. Hemanta has been a Qualys customer for more than a decade. Hemanta holds multiple Industry standard technology certifications including Certified Information Security Manager (CISM) and Certified Information Systems Security Professional (CISSP).

Kumar Ravi

Kumar Ravi

VP of Information Security & Data Privacy, EXL Service

Kumar Ravi brings over 18 years of diversified experience in management, consulting, and implementation in the areas of information security and cybersecurity, data privacy, risk and compliance management, project management, security architecture, and disaster recovery solution design. He is with EXL Service as vice president of Information Security and is responsible for leading EXL's global information security, cybersecurity and data privacy programs. Kumar has a a diploma in Business Management from AIM, Phillipines. He is a certified CISSP, CISA, CISM, CRISC, CEH, DCPLA, ISO 27001LA, CCNP, CCNA and MCSE.

Vinny Hoxha

Vinny Hoxha

Director of Cybersecurity, General Motors

Vinny Hoxha is the Director of the GM Cyber Defense function which is responsible for protecting against threats and vulnerabilities, detecting, analyzing, and containing attacks on GM’s digital information and infrastructure. Since joining the GM security team in 2012, Vinny has been instrumental in establishing several key GM cybersecurity capabilities including the implementation of the first industrial cybersecurity program, implementation of the global application security program, and red team capabilities to continuously assess prevent, detect, and respond capabilities. Vinny holds a Bachelor of Science degree in Computer Information Systems and a Master of Science in Business Information Technology with a concentration in Information Assurance.

Wilson Lee

Wilson Lee

Security Assurance Manager, General Motors

Wilson Lee leads the GM Global Vulnerability Management program, responsible for the timely detection, analysis, and remediation of vulnerabilities across GM’s information technology systems. Wilson has been responsible for implementing GM’s vulnerability management system which automates risk prioritization, governance and vulnerability assessments. Wilson holds a Bachelor of Science degree in Computer Information Systems and a Master of Science in Information Assurance.

Chris Krebs

Chris Krebs

Former Director for the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA)

Before serving as CISA Director, Mr. Krebs served in various roles at the Department of Homeland Security, responsible for a range of cybersecurity, critical infrastructure and national resilience issues. Prior to his time at DHS, he directed U.S. cybersecurity policy for Microsoft, and advised industry and government clients on complex cybersecurity and business risk matters, while serving at positions with Obsidian Analysis and Dutko Consulting.

He also served in the George W. Bush Administration, advising DHS leadership on domestic and international risk management and public-private partnership initiatives.

Mr. Krebs holds a Bachelor’s degree in Environmental Sciences from the University of Virginia and a J.D. from the Antonin Scalia Law School at George Mason University

Sara Griffith

Sara Griffith

CISO, Euronet Worldwide, Inc.

Sara Griffith is the Chief Information Security Officer (CISO) for Euronet Worldwide, Inc. (Nasdaq: EEFT), a public financial services company that is an industry leader in processing secure electronic transactions and payments for financial institutions, service providers, and individual customers all over the globe. Euronet has 9,000 employees in 66 offices worldwide including 41 countries across Europe, Asia Pacific, North America, the Middle East, South America, and Africa. Sara has been fortunate to work onsite in 29 of those countries during her 16 years at Euronet. Sara has been the CISO the past eight years; she has helped lead the global security team to centralize and standardize security policies, requirements, processes, reporting, tools, and training across the organization’s three core business segments, including 22 IT teams supporting 130 entities. Sara resides in Denver with her husband and three children.

Maryann Horst

Maryann Horst

Sr. Principal; Vulnerability Management, Global Cyber Security (GCS), NortonLifeLock

Maryann Horst is a member of NortonLifeLock’s Global Cyber Security (GCS) Threat and Vulnerability Management Team (TVM). Mrs. Horst has experience in implementing a variety of cloud-native security tools, which have enabled her to fill gaps in asset inventories, assess the security posture of cloud resources, ticket security issues for remediation and improve the overall security of her company by reducing its cloud-based attack surface.

Jacob Hahn

Jacob Hahn

Cybersecurity Engineer, Montana State University

Jacob Hahn has spent the last 20 years as a cybersecurity practitioner at Montana State University (MSU), most recently holding the title of Cybersecurity Engineer. He has extensive experience in threat hunting, vulnerability management, incident response and data loss prevention. Jacob holds a bachelor's degree in biology / biological sciences from Montana State University.

Constantine Vorobetz

Constantine Vorobetz

Product Manager, Assets & Reporting, Qualys

Constantine Vorobetz is a product manager at Qualys. Constantine is an experienced security professional with a demonstrated history of working with enterprise security teams to meet their goals and objectives. He’s passionate about technology, security and helping others. He holds a bachelor’s degree in health and human development from Montana State University and a master’s degree in criminal justice from the University of Cincinnati.

Mehul Revankar

Mehul Revankar

VP Product Management and Engineering for VMDR, Qualys

Mehul Revankar is a cybersecurity professional with more than 15 years of experience in Vulnerability Management, Policy Compliance and Security Operations. He leads Product Management and Vulnerability Research at Qualys for VMDR. Before joining Qualys, Mehul led the development of vulnerability and patch management products at SaltStack, and prior to that he led multiple research teams at Tenable. Mehul has a bachelor’s degree in electronics from the University of Mumbai and a master’s degree in computer engineering from George Mason University.

Eran Livne

Eran Livne

Director, Product Management, Endpoint Remediation, Qualys

Eran Livne is director of Product Management for Endpoint Remediation at Qualys, leading a team tasked with helping customers improve their security posture through cross-platform vulnerability remediation. He has more than 20-years of product management and computer science experience working in diverse IT and security markets. In 2014, Eran founded mobile security company, LetMobile, acquired by Ivanti. Following the acquisition, he drove Ivanti's enterprise security and endpoint security and management solutions. Eran holds a bachelor's degree in computer science from Tel Aviv University and an MBA in high-tech business administration from Technion - Israel Institute of Technology.

Hariom Singh

Hariom Singh

Director Compliance Solutions, Qualys

Hariom Singh, CISSP, is director of Product Management for Compliance Solutions at Qualys. With over 18 years of experience in cybersecurity and IT GRC, he shapes compliance products and helps clients secure their cyberinfrastructure while exceeding their IT-GRC goals. Prior to Qualys, he worked as the technical lead for Creative Breakthroughs, a technical consultancy, and as a senior consultant for Symantec, building his vast experience designing and building effective security and compliance programs for large enterprises in the healthcare, energy, financial and telecommunications industries.

Parag Bajaria

Parag Bajaria

VP Cloud & Container Solutions, Qualys

Parag Bajaria is vice president of Product Management at Qualys, focused on building and evangelizing cloud and container products and solutions. He has spent the last decade working in cloud security building products in various domains including data security, cloud posture management, identity security, and workload security. Previously, Parag was head of Product Management at CloudKnox, a cloud infrastructure entitlements management (CIEM) company. Parag has held product leadership roles at HyTrust, Yahoo, and Juniper Networks. Parag has an MBA from Cornell University and a master's in electrical engineering from the University of Maine.

John Delarodie

John Delarodie

Director, Web Application Security, Qualys

John Delaroderie is director of Product Management for Web Application Security. He joined Qualys in 2018 and has spent the past decade working for various government agencies and private organizations in cybersecurity, incident response, digital forensics, and systems integrations. John holds a bachelor's degree in political science from the U.S. Naval Academy and a master’s degree in computer science from the Naval Postgraduate School.

Jim Wojno

Jim Wojno

Senior Director, Product Management, XDR, Qualys

Jim Wojno is senior director of Product Management for the Qualys XDR platform. Jim has worked for several of the industry's top infosec companies covering a 25-plus year career that includes a variety of challenging assignments. As a product leader, Jim’s focus is on incident response, threat intelligence and developing tools that make the blue team a force multiplier in today’s enterprise.

Andrew Morrisett

Andrew Morrisett

Subject Matter Expert, SMB & SME, Qualys

Andrew Morrisett has spent the last five-plus years in Silicon Valley working in security and networking. Within his time at Qualys, he has evolved from a technical account manager into the Solutions Architect role for Qualys Multi-Vector EDR. He has extensive training as an incident responder, runs a security research blog in his free time, and is actively testing malware to help improve Qualys’ detection capabilities. Andrew holds a bachelor’s degree from the University of Colorado at Boulder.

Christopher Sestito

Christopher Sestito

Vice President, Engineering, Data Science, Qualys

Chris Sestito is vice president of Data Science at Qualys. Chris is a decades-long veteran of Cyber Security with experience as a Threat Researcher, Reverse Engineer, and leader of global research and data science teams. Targeting our most complex problems, Chris has committed the rest of his career to the practical application of machine learning in security products.

Krishnakant Deharia

Krishnakant (KK) Deharia

Vice President, Product Management, Platform Services & Integrations, Qualys

Krishnakant (KK) Deharia is vice president of Product Management for Platform Services and Integrations. KK leads product management functions for the Enterprise TruRisk Platform helping customers get immediate value from Qualys solutions including XDR, VMDR, CloudView, CSAM and inline integrated partner products. In his 21-year career, KK led product teams and delivered many innovative products and capabilities with top companies such as McAfee, Intel Corp., Dell Inc., Motorola in Security and Networking domains. KK has a bachelor’s degree in electronics and telecommunication from SGSITS Indore and a master’s degree in computer technology from the Indian Institute of Technology, Roorkee.

Kong Yew Chan

Kong Yew Chan

Director, Product Management, Container Security, Qualys

Kong Yew Chan is director of Product Management at Qualys, leading the container security solution. Prior to Qualys, Kong worked on multiple Kubernetes platforms at VMware and Pivotal. He has over 10 years of experience working on security solutions at Hewlett Packard and TrendMicro. Kong holds a bachelor’s degree in computer engineering from the Nanyang Technological University, Singapore, and an MBA from Babson College.

Francis Finley

Francis Finley

VP of Cyber Detection, Response, and Vulnerability Management, Equifax

Francis Finley is the VP of Cyber Detection, Response, and Vulnerability Management at Equifax.  His teams are tasked with finding malicious activity and responding to it; or threats that could potentially be exploited by malicious actors, both internal and external.  For the past few years Equifax has been undergoing a massive security transformation effort, with all facets of security baked into this, not least of which are Monitoring and Vulnerability Management.  Francis and his teams have been deeply technically involved in integrating into all parts of this transformation and this technical evolution.

Allan Peters

Allan Peters

Chief Revenue Officer, Qualys

As Chief Revenue Officer, Allan is responsible for all aspects of revenue performance driven by focusing on delivering sustainable customer value and business outcomes, the leadership of the worldwide sales and partner organization, and continuing Qualys’ growth momentum.

Allan has more than 20 years of executive sales experience, building and scaling world-class software and services organizations from private growth companies to leading public companies. He previously served as the Chief Revenue Officer of Trustwave, a leader in cybersecurity threat detection and response. Prior to Trustwave, Allan held executive sales leadership positions in public and private growth companies BigFix, Conga, SecurityFocus, CA, IBM and Symantec. He received a bachelor’s degree in business from the University of Kansas.

Jeni White

Jeni White

Information IT Risk Management Chapter Lead, University Technology Office, Arizona State University

Jeni White leads the enterprise IT risk management team of Arizona State University, a Research I university with over 17,000 employees serving nearly 140,000 students. The team uses Qualys apps against roughly 25,000 assets and 200 applications to identify and prioritize vulnerabilities and help distributed technical staff triage and resolve them. Jeni’s background includes over ten years in systems administration and Web applications, over ten years in information security, and the past two years hands-on with Qualys including integration with reporting and ticketing tools in use at ASU.