Qualys at Infosecurity Europe 2018: Best practices presentations from industry leaders
There will be no lack of interesting content from Qualys at Infosecurity Europe this year. Depending on you interests, you might want to make time for some of these talks and presentations. Visit Qualys at stand L100 to hear best practices presentations from industry leaders.
Tuesday, June 5
10:00 – 10:15 AM
Dynamic Web Application Testing in a DevOps World
Ed Arnold, Security Solutions Architect, Qualys
The need to test web applications and APIs for vulnerabilities in an automated fashion is greater than ever. Testing resources are scarce and new code is being written at breakneck speed while the business wants it deployed to production immediately. Learn about new tools and capabilities in Qualys Web Application Scanning (WAS) that are being introduced to help you integrate application security testing into this fast-paced, DevOps environment.
11:00 – 11:15 AM
Expand Current Vulnerability Risk Management Programs by Eliminating Security Misconfigurations
Charlie McAlpin, Technical Account Manager, Qualys
Learn how to build configuration assessment into your overall Security & Vulnerability Risk Management Program. This presentation will showcase how Qualys Security Configuration Assessment (SCA) helps expand your current Vulnerability management program by automating the configuration assessment and reporting of varied IT assets in a continuous manner. We’ll showcase out-of-the-box tools for Center for Internet Security (CIS) policies that feature a simple Web-based UI to customize the policies per your organization, collect data in agent-based and agent-less manner and leverage Qualys’ leading coverage across CIS benchmarks for technologies such as operating systems, databases, applications and network devices.
12:00 – 12:15 PM
Addressing GDPR Compliance for Vendor Risk Assessments with Security Assessment Questionnaire
Pushpak Pradhan, Product Manager, Security Assessment Questionnaire, Qualys
GDPR compliance poses new challenges for vendor risk assessments. Learn how Security Assessment Questionnaire can simplify vendor risk assessments for GDPR compliance.
1:00 – 1:15 PM
Using Qualys FIM to Identify and Manage Change Incidents
Mark Holub, Compliance Security Solutions Architect, Qualys
Real-time change detection has become a critical element of maintaining operational hygiene across rapidly changing assets typical of DevOps infrastructure. This talk will introduce how Qualys File Integrity Monitoring identifies and tracks change incidents across global IT environments. Learn how customers are using FIM to efficiently correlate events, quickly identify and filter out noise, and track review of incidents to meet compliance requirements.
2:00 – 2:15 PM
Introducing Qualys into Security Operations
Martyn Bassington, Security Operations Manager, London Metal Exchange
How the London Metal Exchange have Integrated Qualys vulnerability scanning and compliance into the day to day running of a SOC. Leveraging functionality to reduce costly overheads for a small team with a wide security remit.
3:00 – 3:15 PM
Who Cares About Vulnerability Management? Maersk do
Umair Imran, Vulnerability Manager, Maersk
Umair Imran, Vulnerability Manager at Maersk, will discuss why Maersk cares about Vulnerability Management and how Qualys is helping Maersk achieve its goals. The company prides itself on its 5 values: Constant Care, Humbleness, Uprightness, Our Employees and Our Name.
With the support of Qualys, Maersk is looking to mature itself to better manage its network, data and ultimately its business experience for customers. Qualys enables us to identify and manage risk in a modern way. With over 88,000 employees working in offices, terminals and off-land, we need to embrace technology to allow us to work and for us to manage the information security risk appropriately.
4:00 – 4:15 PM
Achieving 2-Second Visibility with Qualys Cloud Agent
Daniel Brown, Technical Account Manager, Qualys
Securing modern IT infrastructure requires instant visibility of global assets including elastic cloud workload instances, roaming users, and fixed purpose assets – with up-to-date asset configuration data for continuous security, compliance, and threat detection. Learn how Qualys Cloud Agents can extend your Qualys network scanning deployment; deliver instant visibility into security, compliance, and remediation efforts; and how leading companies are using Cloud Agents to secure their digital transformation efforts.
5:00 – 5:15 PM
Securing Containers with Qualys
Hari Srinivasan, Director, Product Management, Cloud and Virtualization Security, Qualys
Learn about how Qualys’ new container security solution enables customers to address security for containers in their DevOps pipeline and deployments across cloud and on-premises environments. In this session, learn how to use Qualys to inventory and track container assets, identify vulnerabilities in images and containers, and incorporate security checks into the CI/CD pipeline, to remediate risks early within the development cycles.
Wednesday, June 6
10:00 – 10:10 AM
Addressing GDPR Compliance for Vendor Risk Assessments with Security Assessment Questionnaire
Pushpak Pradhan, Product Manager, Security Assessment Questionnaire, Qualys
GDPR compliance poses new challenges for vendor risk assessments. Learn how Security Assessment Questionnaire can simplify vendor risk assessments for GDPR compliance.
11:00 – 11:15 AM
Expand Current Vulnerability Risk Management Programs by Eliminating Security Misconfigurations
Mark Holub, Compliance Security Solutions Architect, Qualys
Real-time change detection has become a critical element of maintaining operational hygiene across rapidly changing assets typical of DevOps infrastructure. This talk will introduce how Qualys File Integrity Monitoring identifies and tracks change incidents across global IT environments. Learn how customers are using FIM to efficiently correlate events, quickly identify and filter out noise, and track review of incidents to meet compliance requirements.
12:00 – 12:15 PM
Dynamic Web Application Testing in a DevOps World
Ed Arnold, Security Solutions Architect, Qualys
The need to test web applications and APIs for vulnerabilities in an automated fashion is greater than ever. Testing resources are scarce and new code is being written at breakneck speed while the business wants it deployed to production immediately. Learn about new tools and capabilities in Qualys Web Application Scanning (WAS) that are being introduced to help you integrate application security testing into this fast-paced, DevOps environment.
1:00 – 1:15 PM
Using Qualys FIM to Identify and Manage Change Incidents
Mark Holub, Compliance Security Solutions Architect, Qualys
Real-time change detection has become a critical element of maintaining operational hygiene across rapidly changing assets typical of DevOps infrastructure. This talk will introduce how Qualys File Integrity Monitoring identifies and tracks change incidents across global IT environments. Learn how customers are using FIM to efficiently correlate events, quickly identify and filter out noise, and track review of incidents to meet compliance requirements.
2:00 – 2:15 PM
Introducing Qualys into Security Operations
Martyn Bassington, Security Operations Manager, London Metal Exchange
How the London Metal Exchange have Integrated Qualys vulnerability scanning and compliance into the day to day running of a SOC. Leveraging functionality to reduce costly overheads for a small team with a wide security remit.
3:00 – 3:15 PM
Who Cares About Vulnerability Management? Maersk do
Umair Imran, Vulnerability Manager, Maersk
Umair Imran, Vulnerability Manager at Maersk, will discuss why Maersk cares about Vulnerability Management and how Qualys is helping Maersk achieve its goals. The company prides itself on its 5 values: Constant Care, Humbleness, Uprightness, Our Employees and Our Name.
With the support of Qualys, Maersk is looking to mature itself to better manage its network, data and ultimately its business experience for customers. Qualys enables us to identify and manage risk in a modern way. With over 88,000 employees working in offices, terminals and off-land, we need to embrace technology to allow us to work and for us to manage the information security risk appropriately.
4:00 – 4:15 PM
Qualys CloudView – Visibility and continuous security monitoring for your public clouds
Hari Srinivasan, Director, Product Management, Cloud and Virtualization Security, Qualys
CloudView delivers customers topological visibility and insight about the security and compliance posture of their public cloud infrastructure for major providers including Amazon Web Services (AWS), Microsoft Azure and Google Cloud.
5:00 – 5:15 PM
Achieving 2-Second Visibility with Qualys Cloud Agent
Daniel Brown, Technical Account Manager, Qualys
Securing modern IT infrastructure requires instant visibility of global assets including elastic cloud workload instances, roaming users, and fixed purpose assets – with up-to-date asset configuration data for continuous security, compliance, and threat detection. Learn how Qualys Cloud Agents can extend your Qualys network scanning deployment; deliver instant visibility into security, compliance, and remediation efforts; and how leading companies are using Cloud Agents to secure their digital transformation efforts.
Thursday, June 7
10:00 – 10:15 AM
Dynamic Web Application Testing in a DevOps World
Ed Arnold, Security Solutions Architect, Qualys
The need to test web applications and APIs for vulnerabilities in an automated fashion is greater than ever. Testing resources are scarce and new code is being written at breakneck speed while the business wants it deployed to production immediately. Learn about new tools and capabilities in Qualys Web Application Scanning (WAS) that are being introduced to help you integrate application security testing into this fast-paced, DevOps environment.
11:00 – 11:15 AM
Expand Current Vulnerability Risk Management Programs by Eliminating Security Misconfigurations
Charlie McAlpin, Technical Account Manager, Qualys
Learn how to build configuration assessment into your overall Security & Vulnerability Risk Management Program. This presentation will showcase how Qualys Security Configuration Assessment (SCA) helps expand your current Vulnerability management program by automating the configuration assessment and reporting of varied IT assets in a continuous manner. We’ll showcase out-of-the-box tools for Center for Internet Security (CIS) policies that feature a simple Web-based UI to customize the policies per your organization, collect data in agent-based and agent-less manner and leverage Qualys’ leading coverage across CIS benchmarks for technologies such as operating systems, databases, applications and network devices.
12:00 – 12:15 PM
Achieving 2-Second Visibility with Qualys Cloud Agent
Daniel Brown, Technical Account Manager, Qualys
Securing modern IT infrastructure requires instant visibility of global assets including elastic cloud workload instances, roaming users, and fixed purpose assets – with up-to-date asset configuration data for continuous security, compliance, and threat detection. Learn how Qualys Cloud Agents can extend your Qualys network scanning deployment; deliver instant visibility into security, compliance, and remediation efforts; and how leading companies are using Cloud Agents to secure their digital transformation efforts.
01:00 – 01:15 PM
Using Qualys FIM to Identify and Manage Change Incidents
Mark Holub, Compliance Security Solutions Architect, Qualys
Real-time change detection has become a critical element of maintaining operational hygiene across rapidly changing assets typical of DevOps infrastructure. This talk will introduce how Qualys File Integrity Monitoring identifies and tracks change incidents across global IT environments. Learn how customers are using FIM to efficiently correlate events, quickly identify and filter out noise, and track review of incidents to meet compliance requirements.
02:00 – 02:15 PM
Securing Containers with Qualys
Hari Srinivasan, Director, Product Management, Cloud and Virtualization Security, Qualys
Learn about how Qualys’ new container security solution enables customers to address security for containers in their DevOps pipeline and deployments across cloud and on-premises environments. In this session, learn how to use Qualys to inventory and track container assets, identify vulnerabilities in images and containers, and incorporate security checks into the CI/CD pipeline, to remediate risks early within the development cycles.
3:00 – 3:15 PM
Addressing GDPR Compliance for Vendor Risk Assessments with Security Assessment Questionnaire
Pushpak Pradhan, Product Manager, Security Assessment Questionnaire, Qualys
GDPR compliance poses new challenges for vendor risk assessments. Learn how Security Assessment Questionnaire can simplify vendor risk assessments for GDPR compliance.
Your articles are extremely helpful to me. May I ask for more information?
You helped me a lot with this post. I love the subject and I hope you continue to write excellent articles like this.
Thank you for providing me with these article examples. May I ask you a question?
I’m so in love with this. You did a great job!!
Please provide me with more details on the topic
Please tell me more about your excellent articles
The articles you write help me a lot and I like the topic
I really appreciate your help