Cloud Platform
Cloud platform apps

Qualys webcasts.

These brief webcasts offer best practices and thought leadership on a variety of security and compliance topics, including vulnerability management, PCI compliance, web application scanning, and malware detection.

Recorded Webcasts

  • Nov 1, 2017

    Cloud Security: Defense in Detail if Not in Depth. Part 1: Using Cloud Services to Address the Cloud Threat Environment

    Results of the 2017 SANS Cloud Security Survey are likely to show big changes compared to last year. Hear SANS cloud security guru Dave Shackleford discuss the results of the survey and get an idea of how your colleagues are adapting to the enormous threat environment of the cloud, how fast the cloud is evolving, and ways to address it. Attend this webcast to learn about data breaches involving cloud applications, applications and assets that are most commonly targeted, top threats to cloud security, as well as issues and challenges in maintaining cloud security.

  • Oct 10, 2017

    DevSecOps - Building Continuous Security Into IT & App Infrastructures

    Security teams must adapt security controls to the growing use of DevOps processes such as cloud services, Continuous Integration and Continuous Deployment. Many of them are adopting an approach of Security delivered as a service, or DevSecOps. In this webcast, SANS Senior Analyst John Pescatore joins Chris Carlson, VP Product Management for Qualys Cloud Agent Platform, to discuss how and why security teams are partnering with app developers and sysadmins to build continuous security capabilities that are embedded into the fabric of IT and application infrastructures, and how to get started and build a DevSecOps program for improved and automated auditing, compliance, and control of applications.

  • Sep 28, 2017

    Automating CIS Critical Security Controls for Threat Remediation and Enhanced Compliance

    • pc

    The CIS Critical Security Controls are intended to stop today’s most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and networks. In this webcast SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance, will discuss how to achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs.

  • Aug 15, 2017

    Security Whack-a-Mole: SANS 2017 Threat Landscape Survey

    • vm
    • cm
    • was
    • waf
    • tp

    As fast as we learn to detect new threats, the threats change - like a game of Whack-a-Mole happening at an ever-increasing pace. The SANS community is on the forefront of this battle and has answered the call to take a SANS survey on the threats their organizations face every day.

  • Jul 20, 2017

    Securing Your Public Cloud Infrastructure

    • ai

    Public cloud providers operate on a shared responsibility model, which places the onus on the customer to define and secure the data and applications that are hosted within cloud infrastructure. To that end, it is critical that organizations accurately and selectively pinpoint which cloud workloads and virtual IT assets must be monitored, updated and patched based on developing threats to customer data and applications. This webcast will detail how you can gain complete visibility of your organization’s entire cloud asset inventory and security posture to help you keep up with shared security responsibility models across public cloud infrastructure.

  • Jun 20, 2017

    Streamlining Third Party Risk Assessments in the Cloud

    • saq

    For most businesses, security assessments are a slow, unscalable, manual process that strains InfoSec teams and creates a backlog of security evaluations. During this webcast, Jonathan Osmolski, Manager of Enterprise Records and Information Governance at Pekin Insurance, and Hariom Singh, Director of Product Management for Qualys Security Assessment Questionnaire (SAQ) will show you how you can free your organization from unreliable and labor-intensive manual processes, and optimize the accuracy of audit results.

  • Jun 1, 2017

    Visualize Your Threat Exposure to WannaCry & Shadow Brokers With Dashboards

    • ai
    • tp

    Determining whether the WannaCry vulnerability exists within your global IT environment can be a daunting task, and existing enterprise security solutions are slow to deploy. This webcast will demonstrate how you can identify, track, and remediate assets susceptible to WannaCry and its variants, create dashboards and reports to visualize the impact of assets in real time and track your remediation efforts, and institute threat-prioritized remediation processes to mitigate current and future risks.

  • May 24, 2017

    Countdown to GDPR - Reduce your Risk

    Are you thinking about the EU General Data Protection Regulation (GDPR) and the huge potential fines of €20m or 4% of annual worldwide turnover? Qualys solutions can help your organisation prepare and comply with GDPR as the 25 May 2018 deadline approaches. During this webcast, Jonathan Armstrong, Compliance and Technology Lawyer, Partner at Cordery and Darron Gibbard, Managing Director, EMEA North at Qualys, will answer any compliance questions and highlight the key areas to consider and show you how to know and control your data, assets and suppliers.

  • May 23, 2017

    Spot & Patch Web App Bugs in One Click

    • was
    • waf

    Web application security is becoming increasingly complex due to the continuously evolving threat landscape, the diverse nature of web applications, and the broad range of systems needed to manage security. During this webcast, the presenters will show you how Qualys simplifies web app security with an end-to-end solution.

  • May 17, 2017

    How to Rapidly Identify Assets at Risk to WannaCry Ransomware

    The major ransomware attack using a leaked NSA exploit known as “WannaCry” has hit more than approximately 150 countries since May 5. Approximately 200,000 infections globally have been detected and the attack, which uses the WannaCry (WanaCrypt0r 2.0) ransomware, continues to spread. Join this webcast to learn about patches and other mitigations for WannaCry, detecting and getting full visibility on impacted assets for prompt remediation, and instituting threat-prioritized remediation processes to mitigate current and future risks.

  • May 4, 2017

    Gain Visibility & Control of IT Assets in a Perimeterless World

    • ai

    In today’s perimeterless world, enterprise security teams are challenged with maintaining visibility and control over the exploding number of assets on their networks. During this webcast, the presenters will cover the six key elements of an ideal cloud-based IT asset inventory system.

  • May 3, 2017

    Automated Compliance Assessment for RBI Cyber Security Guidelines

    • pc

    The RBI Guidelines for Cyber Security assist financial institutions to achieve this through a new-era preventative security baseline. During this webcast, Shailesh Athalye, Qualys Senior Manager, Compliance Research and Analysis, will discuss how financial institutions can easily address both the technical & procedural elements of the RBI Cyber security guidelines in an automated manner using the highly scalable Qualys Cloud Platform.

  • Mar 22, 2017

    Detect and Block Apache Struts Bug Across Your Enterprise

    • was

    Apache has issued an emergency security alert, classifying this as a high-risk vulnerability. If left unaddressed, organizations are at risk of remote code execution attacks, which could lead to complete system compromise. During this webcast, we will show you how Qualys' complete, end-to-end security solutions can detect and patch the vulnerability so that you can keep your business-critical information safe from attackers.

  • Mar 21, 2017

    2017 Cybersecurity Trends: Aiming Ahead of the Target to Increase Security

    A new trend report by the SANS Institute focuses on the latest and best security practices and common success patterns that will prevent your organization from falling victim to major data breaches. Chris Carlson of Qualys joins SANS Director of Emerging Security Trends John Pescatore for a live webcast to discuss the trends revealed in the report including; the importance of uncovering breaches quickly and mitigating damage, expanding current security measures to better protect data in the cloud and addressing the security shortcomings of the Internet of Things (IoT)

  • Feb 8, 2017

    Aligning Web Application Security with DevOps and IoT Trends

    • was

    As the proliferation of IoT devices complicates the web app security landscape, security teams must engage with key app development counterparts to better secure apps across new types of devices, without slowing rapid DevOps methods or adding InfoSec strain. During this webcast, guest speakers Amy DeMartine from Forrester, and Jason Kent from Qualys will discuss how to secure apps at the speed of DevOps, utilise web security and infrastructure security assessment practices in the age of IoT, and mitigate the risk presented by the new IoT attack surface.

  • Nov 1, 2016

    Securing Your Web Apps in Today's Complex Cloud Environment

    • was

    Securing web applications has become more complex as organizations increasingly deploy and manage their web applications in the cloud. During this webcast Alex Jones from Gainsight and Dave Ferguson from Qualys will discuss how Qualys has helped Gainsight to, scan, discover, catalog applications on multiple cloud environments for vulnerabilities and website misconfigurations, adapt to increasingly complex and new web application technologies and build an easy-to-use, accurate and scalable scanning program across web application and network infrastructure.

  • Oct 6, 2016

    Overcome Outdated Processes and Automate IT Risk & Compliance

    • pc

    As IT, business, and regulatory environments grow increasingly complex, risk and compliance pros must move past outdated processes and legacy systems to innovate and find ways to achieve higher degrees of efficiency and oversight. Join guest speakers Nick Hayes, Analyst at Forrester, and Josh Hankins, Information Security Solutions Manager at 84.51° as they present how you can, move up the maturity curve through better program coordination and technology integration, establish the right metrics to build the business case and showcase continual progress and bolster future success by prioritising business agility and data mastery as top strategic objectives.

  • Sep 13, 2016

    Excel at Your Security Assessments Without EXCEL Spreadsheets

    • saq

    Join this webcast to learn how you can streamline your vendor and IT risk audits with a centralized solution. Traditionally security assessment surveys are implemented via email and using Excel spreadsheets. This is a manual, time-consuming method that invites errors and omissions. Qualys Security Assessment Questionnaire (SAQ) allows you to manage the assessment processes effectively, by automating these surveys to ensure the process is agile, accurate, comprehensive, centralized, scalable and uniform.

  • Aug 18, 2016

    Improving on "Whack-a-Mole" Vulnerability Management

    • tp

    The need to prioritize vulnerability management (VM) is greater than ever as IT security teams become overwhelmed with trying to protect against every threat that pops up. Join guest speaker Joseph Blankenship, Senior Analyst at Forrester, and Jimmy Graham, Director of Product Management at Qualys as they discuss Forrester data trends and insights from real-world client scenarios, why vulnerability management needs to be prioritized and Qualys will discuss how ThreatPROTECT shows you what to remediate first.

  • Jun 23, 2016

    Prioritize and Remediate your Vulnerabilities with Qualys ThreatPROTECT

    • tp

    Qualys’ newest solution ThreatPROTECT correlates vulnerability data with a Live Threat Intelligence Feed from multiple industry sources, providing customers with an easy-to-understand dashboard that provides clear insight into which vulnerabilities to fix first. During this webcast presenters Wolfgang Kandek, and Tim White, will show you how you can use ThreatPROTECT to quickly identify your most important assets and critical vulnerabilities allowing you to prioritize your remediation efforts.

  • May 17, 2016

    Vulnerability Detection in Today’s Mobile Workforce

    • ca

    Getting to know your current vulnerability data from your mobile workforce is a difficult task. If the mobile devices are not on the network at the time of your scan your data could become out of date by weeks or even months. Join this webcast to discover how Synovus Bank use Qualys Cloud Agent to perform frequent vulnerability scans for all internal and external assets, receive faster notification and remediation for zero day and critical threats and improve their vulnerability analysis and security patching programs by providing data that can be used to prioritize patch distribution.

  • Apr 5, 2016

    Detect All Your IT Assets in SECONDS

    • ai

    A huge hurdle to protect your network is knowing exactly what devices are connected. This information is vital for quickly finding and fixing vulnerabilities. Join this webcast to discover how to run instant queries that return results in seconds, search for OS and App configuration information on all your assets for fast, accurate and actionable data and get a unified view of your IT and Security data.

  • Jan 20, 2016

    Cloud Without Borders - High-Confidence, Secure Computing: Anytime & Anywhere

    Powerful technologies from the core to the edge are enabling new insights and transforming value creation. But these opportunities create new risks and urgently beg for innovative approaches to securing our most precious information. Learn how a new architecture of cloud security expertise, endpoints and apps will enable high-confidence computing and deliver security and privacy anywhere, anytime.

  • Dec 15, 2015

    Mastering Vulnerability Management with A Risk-based Approach

    • vm

    To effectively prioritize and remediate the most critical vulnerabilities threatening your organization, you need to combine internal asset risk evaluation with external real-time exploit and threat intelligence to create the most accurate picture of incidence and impact. Join this webcast to learn how Qualys and Brinqa provide all the tools you need to dramatically improve the effectiveness and performance of your vulnerability management program.

  • Dec 10, 2015

    The ABCs of The Pragmatic CISO: Assets, Borderless-ness, and Compliance

    With cyber security taking the front seat in the boardroom, CISOs now have more visibility than ever before. But, many are struggling to gain the visibility they need to be effective and searching for practical techniques to gain full control over their assets for continuous security and compliance. Join this webcast where we'll cover the ABCs of being a pragmatic CISO.

  • Oct 29, 2015

    A New Level of Visibility And Certainty for Security Professionals

    • ca

    Do you want to be able to answer questions like these quickly and with confidence? Which of your vulnerabilities are actively being exploited? What unauthorized software is installed on your assets? Join this webcast to discover how you can get a new level of visibility and certainty using a free asset inventory product from Qualys.

  • Oct 13, 2015

    Top Takeaways for National Cyber Security Awareness Month

    In this 30-minute webcast, industry experts Mike Rothman, President of Securosis Research and Wolfgang Kandek, CTO of Qualys will share their top recommendations for making the most of National Cyber Security Awareness Month. With data breaches in the headlines of nearly every online magazine, it’s never been a better time to maximize cyber security awareness and translate it into pragmatic results for the enterprise.

  • Sep 17, 2015

    Applying Actionable Threat Intelligence to Your Vulnerability Management Program

    • vm

    Adding real-time threat context to your vulnerability and remediation management enables you to prioritize the most critical vulnerabilities at the right time, and reduce your exposure to threats. If you can automate this process, all the better: you're able to quickly and confidently remediate the right vulnerabilities. This live webcast will showcase how Qualys and Kenna together connect an organization’s vulnerability scanning program with actionable threat intelligence to employ a risk-based approach to vulnerability management.

  • Sep 15, 2015

    Addressing Web Application Vulnerability with Integrated, Continuous Protection

    • cm
    • was

    In 2015 Gartner Magic Quadrant for Application Security Testing, Qualys was positioned highest in the "Ability to Execute" within the "Challengers" quadrant. Introducing virtual patching in the recent release of Qualys Web Application Firewall, Qualys now brings an end-to-end solution to web application security, delivering an integrated web application scanning and firewall that discovers, catalogs and protects all of your web applications wherever they reside — on premise or in the cloud. Find out how Qualys can help you implement web application security throughout your systems development lifecycle (SDLC).

  • Sep 3, 2015

    Visibility and Actionable Data Across Millions of IT Assets in Seconds

    • ca

    Knowing what IT assets you have and how to protect them is increasingly a challenge as globalization, virtualization and mobile assets create new endpoints and new opportunities for hackers to infiltrate. Now you can move beyond traditional scanner-based approaches to strengthen endpoint security with a free solution from Qualys. Discover how Qualys AssetView gives you a fast, actionable view of all IT assets while helping to maintain security and compliance organization-wide.

  • Aug 20, 2015

    Setup for Success with Qualys Express - Part 3: How to Catalog and Scan All of Your Web Apps for Vulnerabilities

    • was

    In this webcast, we will look into some easy steps you could take to run vulnerability scans against web applications. We will show you step-by-step how to configure Qualys Web Application Scanning, execute discovery and vulnerability scans, as well as run reports and create a strategy for remediation.

  • Aug 13, 2015

    Setup for Success with Qualys Express - Part 2: Proactively Secure Both Perimeter and Internal IT Assets with Continuous Monitoring

    • cm

    In this webcast, we will cover a few steps you could take to identify and filter on key events and/or vulnerabilities and quickly alert the proper staff to take action before the attackers do. We will show you how to deploy rules (whitelists and blacklists), set the system to detect important changes (new hosts, nearly expired certificates, etc), as well as deliver alerts to any users or systems that need to know.

  • Jul 30, 2015

    Qualys Express - Part 1: Setup for Success with Vulnerability Management

    • vm

    In this webcast, we will go over Qualys hardware and virtual scanner appliances for internal and external vulnerability scans. We will then demonstrate how you can discover various assets in your network, prioritize them, execute vulnerability scans, and generate reports that would suit your needs.

  • Jul 21, 2015

    Getting Started with Qualys Express Lite - Part 2: Web Application Scanning

    • was

    In this webcast, we will look into some easy steps you could take to run vulnerability scans against web applications. We will show you step-by-step how to configure Qualys Web Application Scanning, execute discovery and vulnerability scans, as well as run reports and create a strategy for remediation.

  • Jul 21, 2015

    NHS Dumfries & Galloway: Building the Business Case for Mitigating Risks

    • vm

    Join Gordon Wallace, Technical Manager at Qualys, and Andrew Turner, Head of Information Assurance and Security at NHS Dumfries & Galloway for this informative webcast. You’ll see how the IT department of NHS Dumfries & Galloway secures its IT systems for all medical facilities and data centres in the region—including 1,000 general practitioners and 4,500 staff.

  • Jul 15, 2015

    Next-Gen Vulnerability Management with Cloud Agent

    • ca

    As global networks evolve, traditional assessment methods present many challenges for security teams such as scanning windows, managing credentials, and the rise of cloud environments. Learn more about the next phase of security assessment and how Qualys Cloud Agent instantly turns on full access to the power of Qualys vulnerability management and policy compliance. See how to extend the power of the Qualys Cloud Platform anywhere in the world and on any host including laptops, desktops, servers or virtual machines.

  • Jul 7, 2015

    Getting Started with Qualys Express Lite - Part 1: Vulnerability Management

    • vm

    In this webcast, we will go over Qualys hardware and virtual scanner appliances for internal and external vulnerability scans. We will then demonstrate how you can discover various assets in your network, prioritize them, execute vulnerability scans, and generate reports that would suit your needs.

  • Jun 11, 2015

    Web Application Security Trends and Solutions

    • was
    • waf

    Qualys and a guest from Forrester Research discuss in details the driving factors behind the increasing demand for web application security, trends in web application security, and key elements to implement best-in-class web application security programs.

  • Jun 4, 2015

    Better Information Reveals Your High Risk Vulnerabilities

    • vm

    Join this webcast to learn how to get better information about the top vulnerabilities that need your attention and what to do about them. US-CERT Top 30 provides guidance that allows you to identify the most commonly exploited vulnerabilities and implement the right patches across your entire network.

  • May 19, 2015

    Proactively Monitor Both Perimeter and Internal IT Assets

    • cm

    Qualys’ popular Continuous Monitoring (CM) solution now includes internal monitoring capabilities to enable you to proactively monitor and get real-time alerts for critical internal IT assets (e.g. desktops, servers and other devices) to identify potential threats, while accelerating incident response time. Find out more in this webcast.

  • May 7, 2015

    Virtual Patching: End-to-End Web Application Security Cloud Service

    • was
    • waf

    Find out how the new release of Qualys WAF 2.0 provides an end-to-end solution that combines web application scanning and web application firewall to effectively detect and mitigate vulnerabilities.

  • Apr 30, 2015

    Best Practices for PCI Compliance

    • pci

    Join Qualys for a webcast to hear more about some practical steps to steer your company into compliance and create a solid defense against the latest threats to cardholder data.

  • Apr 29, 2015

    Introducing the Cloud Agent Platform

    • ca

    Join this webcast to find out about the Qualys Cloud Agent Platform (CAP). A revolutionary new platform that extends Qualys’ industry-leading Cloud Security and Compliance Platform with lightweight agents to continuously assess security and compliance of your global IT infrastructure and applications.

  • Apr 21, 2015

    Live Q&A Session: Detecting & Addressing Unsafe SSL Configurations

    • vm

    Following the success of our recent SSL webcast, “Detecting & Addressing Unsafe SSL Configurations”, we’re happy to announce a live follow up Q&A session with Wolfgang Kandek, CTO and Ivan Ristić, Author and Director of Application Security Research at Qualys. The webcast will begin with a recap on the current state of SSL encryption and how major problems are being addressed as covered in the initial session which can be viewed here. This will be followed by a thirty minute Q&A session where you can put any of your SSL security concerns and questions to our presenters for an expert response.

  • Mar 26, 2015

    Detecting and Addressing Unsafe SSL Configurations

    • vm

    As a security professional, you are on constant alert for external threats. But many breaches are caused internally by incorrect configuration of IT resources, including SSL. To help improve how encryption is used, Qualys created a research project called SSL Labs to address two major problems of the ecosystem: lack of tools and documentation. Join Qualys for a webcast to hear more about the current state of SSL encryption and how major problems are being addressed.

  • Mar 23, 2015

    Did You Know? You Can Easily Respond to Constantly Evolving Internet Attacks.

    • vm

    With attacks on the rise and constantly changing, it’s more important than ever to respond fast. Find out how Qualys Vulnerability Management gives you a new approach to continuously secure your IT infrastructure with immediate, global visibility against evolving threats. Join this webcast to discover real-world examples of the automated solution trusted by thousands of organizations worldwide.

  • Mar 16, 2015

    Did You Know? More Visibility of Your IT Assets Enables Better IT Security.

    • vm

    If you could see your network assets the way hackers do, you’d know a lot more about your vulnerabilities. To secure your information systems requires control and continuous visibility of the entire network and its various components. Join this webcast to discover how Qualys ensures maximum visibility and the most accurate view of your network security.

  • Mar 12, 2015

    Preventing Web App Attacks with Progressive Scanning

    • was

    Join us to learn how Qualys WAS 4.0 with Progressive Scanning provides organizations like ThousandEyes with powerful new capabilities to enhance testing coverage and provide flexible scan scheduling, reducing the burden on understaffed IT security teams.

  • Mar 11, 2015

    Did You Know? You Can Find and Fix Vulnerabilities Before Hackers Attack!

    • cm

    Constantly evolving threats can be more difficult to counter—unless you have full visibility into potential vulnerabilities of your infrastructure. Built on the leading cloud security and compliance platform, Qualys gives you immediate, global visibility of IT vulnerabilities with continuous monitoring. Join this webcast to discover more.

  • Mar 10, 2015

    Get Complete IT Compliance: Reduce Risk and Cost

    • vm

    Join Qualys and BMC to learn more about the first solution to tie vulnerability information to automated remediation actions. This dramatically reduces the window of vulnerability while simultaneously improving IT operational performance. In this webcast you will learn how you can mitigate the SecOps gap.

  • Feb 11, 2015

    Best Practices for IT Configuration Compliance

    • pc

    Join us to learn how to reduce risk from incorrect configuration of IT resources with an easy, automated solution to maintain correct settings.

  • Dec 11, 2014

    Maximizing Coverage with Progressive Scanning

    • was

    While automated web application scanning provides organizations with the most cost effective way to identify security vulnerabilities such as the OWASP top 10, most web application scanners scan the same functionality — even if you run multiple scans. Join us for this webcast to learn how progressive scanning highlights the importance of coverage of application functionality and increases safety.

  • Dec 10, 2014

    Cloud Security and Compliance Solution for SMB

    According to a recent threat report, the largest growth area for targeted attacks was businesses with fewer than 250 employees. Typically SMBs are extremely resource constrained and just like large enterprises, SMBs also face a myriad of regulations that they must comply such as HIPAA and PCI. Join our guest Forrester’s Principal Analyst for Security & Risk, Rick Holland and Qualys CISO, Jonathan Trull for a webcast on cloud security solution and compliance for SMB.

  • Dec 9, 2014

    Vulnerability Scanning That Never Stops

    • cm

    As businesses evolve and the rate of change and attacks increase, standard vulnerability scanning techniques are no longer efficient. Now get a comprehensive view of your network so you can identify and address threats and weaknesses before hackers do.

  • Dec 3, 2014

    How to Prevent the Next Shellshock

    • was

    Between the recent Shellshock vulnerability and the web CGI based attack vectors, attackers are always finding new ways to take control of vulnerable web servers. Join us for this webinar for a review of how a Web Application Firewall can protect you.

  • Nov 20, 2014

    Revealing Web Application Vulnerabilities

    • was

    Vulnerabilities like Shellshock can expose unauthenticated attack vectors and increase risk to your organization—especially if you can’t fully assess your web applications. In this webcast, learn how to increase security with an automated process for testing web applications for vulnerabilities.

  • Nov 4, 2014

    Driving Remediation of Control Deficiencies

    • pc

    With today’s complex and changing IT environments, driving effective remediation by prioritizing efforts where they have the most impact is a must. Learn effective methods that successful organizations use to get the most impact from their remediation efforts.

  • Oct 30, 2014

    Building an Automated Compliance Program

    • pc

    If you’re looking to reduce the effort, time and cost of assessing systems throughout your network to maintain compliance and increase security, you won’t want to miss this informative webcast. Learn a straight-forward way to build an automated compliance program at your organization by following key best practices and critical tasks for setting up and automating your control assessment program.

  • Oct 23, 2014

    Importance of Automated Controls Assessment

    • pci

    With multiple mandates, constantly changing IT environments and a vast and evolving threat landscape—maintaining compliance requires measurable and enforceable controls. Now you can reduce risk and continuously comply with internal policies and external regulations.

  • Oct 6, 2014

    Shellshock: Detect and Defend with Qualys

    Shellshock vulnerability represents a serious threat to most organizations—requiring a swift and thorough response. Now learn more about it and what you can do to reduce your risk from different attack vectors using an automated and systematic approach.

  • Sep 23, 2014

    Preventing Breaches with Qualys Continuous Monitoring

    • vm

    Jonathan Trull and Tony Sager demonstrate how to take back the offensive by getting inside your adversaries decision cycle including how to configure non-intrusive yet impactful daily scans that scale to millions of IP addresses spread across the globe; and the key operational aspects of moving to continuous monitoring.

  • Sep 18, 2014

    PCI DSS v3: Scanning and Penetration Testing Implications

    • pci

    Join John Hetherton (QSA) of Espion and Gordon Caulfield (SME) of Qualys as they discuss the key changes in PCI DSS Version 3.0, examine penetration testing methodology from the auditor's point of view, and how you can maintain compliance.

  • Sep 16, 2014

    The Case for Continuous Vulnerability Assessment and Remediation

    • cm

    Qualys CISO Jonathan Trull and Tony Sager, Chief Technologist for the Council on CyberSecurity review the historical evolution of vulnerability scanning and remediation, outline common obstacles to continuous monitoring and review strategies for overcoming them, and demonstrate the importance of getting inside your adversary's Observe-Orient-Decide-Act (OODA) loop.

  • Aug 2, 2014

    Web Application Threats and Trends

    • was

    This webcast reviews recently published web application threat intelligence from IBM, Verizon and Symantec to provide a current view of the web application threat landscape. The changing methods and motives of attackers will be reviewed as will the best practice methods for detecting and defending against the risks these threats represent.

  • Jun 19, 2014

    Using Qualys Reporting Tools to Effectively Manage and Monitor Vulnerability Patching

    In the webcast, Philip Niegos demonstrates the effective use of three Qualys Reporting Tools: 1) Patch Report, 2) Remediation Report, and 3) Vulnerability Scorecard Report, that can be combined to build a successful vulnerability detection and patch management solution from top to bottom.

  • Jun 18, 2014

    The Top 5: Vulnerability Management Mistakes

    • vm

    In this webinar, you'll learn how to avoid common vulnerability management mistakes to guard your business against a successful breach and improve your overall security risk posture.

  • Jun 17, 2014

    Managing Risk and Vulnerabilities in a Business Context

    • vm

    Cyber attacks have a direct impact on the bottom line, yet most organisations lack the visibility and understanding to manage IT risk from the business perspective. In this webcast, our panel of experts will discuss how to shift from viewing IT risk in bits and bytes to having an impact on critical applications in the data centre.

  • Jun 12, 2014

    Avoid a Breach: Using Authenticated Scanning to Uncover Hidden Security Vulnerabilities

    • vm

    In this webinar, join security experts Jonathan Cogley, CEO at Thycotic and Ben Yoder, Product Manager at Thycotic, Parag Baxi, Director Product Management at Qualys to learn how authenticated scanning can not only immediately increase your company's security posture by detecting deeper vulnerabilities, but also improve regulatory compliance procedures to ensure network protection against a future breach.

  • Jun 10, 2014

    Uncover Threats in Your Perimeter in Minutes, not Hours: Use Immediate Alerts - Instead of Long Reports

    In this interactive webinar, you'll learn a new way to quickly and easily get ahead of today's real-world threats such as Heartbleed (and whatever comes next), hidden SSH "moles," and expiring SSL certificates. A live demo will show you how to use immediate alerts to accelerate your security – and get rid of the pain and delays of dealing with huge reports!

  • May 22, 2014

    Best Practices - Automating Secure Configuration Assessment

    • pc

    In this webcast we discuss how effective configuration control are implemented to minimise security risks associated with poor configuration settings, how SaaS-based automation is a key success factor in applying performance, and we will have a quick demonstration of Qualys policy compliance.

  • May 15, 2014

    Using the Scan Report Template - From Vulnerability Assessment to Vulnerability Management

    • vm

    In this webcast Nick Dlouhy, reviews how to use the Qualys scan report template

  • May 8, 2014

    Automating Secure Configuration Assessment Best Practices

    In this webcast we discuss how effective configuration control are implemented to minimize security risks associated with poor configuration settings, how SaaS-based automation is a key success factor in applying performance, and we will have a quick demonstration of Qualys policy compliance.

  • May 1, 2014

    Real-world case study on how NHS Dumfries & Galloway responded to Heartbleed

    In this webinar we describe the inner workings of the flaw, detail the detection mechanisms used by Qualys, and cover less-visible instances of Heartbleed that you might be missing. Andrew Turner, Head of Information Assurance and Security for NHS Dumfries & Galloway, will describe how they are taking on Heartbleed.

  • Apr 24, 2014

    Real-world case study on how the State of Colorado responded to Heartbleed

    In this webinar we describe the inner workings of the flaw, detail the detection mechanisms used by Qualys, and cover less-visible instances of Heartbleed that you might be missing. The State of Colorado provide a real-world perspective, the CISO of the State of Colorado Jonathan Trull will describe how the state is taking on Heartbleed.

  • Apr 2, 2014

    Discover your Network using Qualys Asset Tagging and Management

    • ai
    • vm

    In this webcast learn the changes to the latest top 10 list and how to interpret difference between vulnerabilities, exploits, and weaknesses.Phil Niegos, senior technical trainer at Qualys will demonstrate how easily asset management can be setup and configured within Qualys

  • Mar 27, 2014

    Reviewing the Latest OWASP Top 10

    • was
    • waf

    In this webcast learn the changes to the latest top 10 list and how to interpret difference between vulnerabilities, exploits, and weaknesses.

  • Mar 13, 2014

    Strong Security Drives Compliance

    • vm

    In this webcast learn how aging infrastructures, ongoing cyber threats, and lack of actionable information are being solved by organizations in the energy sector.

  • Mar 12, 2014

    Managing Risk and Vulnerabilities in a Business Context

    • vm

    In this webcast, our panel of experts discuss how to shift from viewing IT risk in bits and bytes to having an impact on critical applications in the data centre.

  • Jan 16, 2014

    Back to the Basics - PCI Validation

    • pci

    In this webcast, our panel of experts discuss the importance of consistent, program-level testing on your PCI environment.

  • Sep 24, 2013

    PCI 3.0: What does it mean?

    • pci

    PCI 3.0 is set to be released in November 2013, as part of the PCI Council's ongoing process of updating the standards. Join us as Bernie Weidel of Qualys, Inc (PCI ASV) and Tom McDonald (QSA) of Network Compliance Solutions provide an overview of some of the core fundamental aspects of the current PCI Standards, and how these security measures provide real-world protection against hackers and malicious attacks. We will then outline the changes coming in the new 3.0 version, and the steps you can take now to prepare your company for the new requirements.