Contact us below to request a quote, or for any product-related questions
The combination of today’s fast changing IT environments, increasingly common “headline” vulnerabilities and swift weaponizing of exploits requires a more automated, continuous and precise approach. Defense methods such as IT asset inventory, vulnerability management, threat prioritization, and patch deployment all must adapt with new speed and scale to deliver continuous visibility of global IT assets and environments for the realities facing today’s digital business.
Join Qualys along with featured guest speaker Josh Zelonis, Senior Analyst at Forrester, to discuss the practical realities of prioritization in the era of digital transformation, industrious attackers and headline vulnerability disclosures. How can security teams sort through thousands or millions of vulnerabilities in time to prioritize a subset of those, act appropriately, then report up the chain?
Josh Zelonis is a senior analyst at Forrester, serving Security & Risk Professionals. He covers security architecture and operations, with a focus on cyber threat intelligence, detection, and response. In this role, he helps clients continuously adapt their architecture, policies, and processes to evolving threats while also developing robust incident response capabilities that limit the impact of breaches. His research focuses on threat intelligence, vulnerability assessment/management, malware analysis, and incident response.
Senior Analyst, Forrester
Jimmy Graham, Director of Product Management at Qualys, has been deeply involved in information security and vulnerability management for over 10 years, in both higher education and corporate environments. He has managed teams covering firewalls, SIEM, IDS, application security, vulnerability management, penetration testing, governance, and compliance.
Director of Product Management, Qualys