Company brings more security and reduces risk through a single unified platform with updates to renowned VMDR and Asset Management Solutions
Visit us at booth 1320 to meet with
- VMDR 2.0 with TruRisk™: Provides the insight security and IT teams need to prioritize vulnerabilities, for remediation, that genuinely reduce risk within their organizations. Stop by the booth to learn how Vulnerability Management, Detection and Response (VMDR) customers were able to reduce risk on average by 23% and in some cases as high as 50%.
- CyberSecurity Asset Management 2.0: Experience the new enhancements that allow organizations to continuously monitor their external attack surface, and quickly remediate all from a single platform.
- The Qualys Research Team: Two PWNIE Award nominations for cutting-edge research, discovery and responsible disclosure of new and critical vulnerabilities PWNKIT and Oh Snap! More Lemmings.
Attendees are welcome to join our speaking sessions and booth presentations, including best practice presentations from customer Euronet Worldwide as well as a leading healthcare customer, highlighting how VMDR helps them reduce risk. The full schedule can be viewed here.
Making External Attack Surface Management (EASM) the First Step for Reducing Your Cybersecurity Risk |
|
WHO: |
|
WHAT: |
As an organization's digital footprint grows rapidly so does its attack surface – with unknown assets often going unnoticed by security teams but being discovered and leveraged by attackers. Siloed external attack surface management (EASM) tools provide a laundry list of assets without any context, requiring security teams to manually analyze assets and conduct a very manual time-consuming process to reduce risk. More information can be found here. |
WHEN: |
|
WHERE: |
In-Person session at Business Hall Theater A |
Rapid Response – Getting Under the Attack Envelope |
|
WHO: |
|
WHAT: |
Attendees will learn how to remediate faster and more efficiently by prioritizing vulnerabilities, leveraging rule-based integrations between VM and ITSM tools, automating operational workflows, and using integrated patch management. |
WHERE: |
Virtual session - register for free business pass here. |
Elevating Vulnerability Management Programs with Business and Security Risk Context |
|
WHO: |
|
WHAT: |
This discussion will detail a new integrated approach from |
WHERE: |
Virtual session - register for free business pass here. |
DEF CON: Tools for Creating and Learning from CTW writeups |
|
WHO: |
|
WHAT: |
Writeups for CTF challenges and machines are a critical learning resource for our community. For the author, it presents an opportunity to document their methodology, tips/tricks, and progress and for the audience, it serves as a reference material. This demo aims to showcase tools developed to help users curate their learning in .yml structured files, find insights and query this knowledge base as and when needed. |
WHERE: |
Virtual session - register here. |
The Qualys Cloud Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, workloads and web applications across on premises, endpoints, servers, public and private clouds, containers, and mobile devices. Founded in 1999 as one of the first SaaS security companies,
Media Contact
+1 (707) 478-3737
jdutton@qualys.com
View original content to download multimedia:https://www.prnewswire.com/news-releases/qualys-to-lead-four-sessions-at-black-hat-2022-and-def-con-30-301594158.html
SOURCE