Qualys CEO to Deliver Keynote at RSA Conference USA 2014

Qualys Executives and Researchers Highlight the Need to Redefine Defense in Depth Strategies for the Cloud Computing Era


REDWOOD CITY, Calif., Feb. 18, 2014 (GLOBE NEWSWIRE) -- Qualys Inc. (Nasdaq:QLYS), a pioneer and leading provider of cloud security and compliance solutions, today announced that its chairman and CEO Philippe Courtot will deliver a keynote speech at the upcoming RSA Conference USA 2014. In his keynote, Courtot will discuss how the cloud has redefined our lives and businesses, forcing us to rethink the current security model we rely upon, and the urgent need to make it more real-time and resilient for fending off cyber attacks.

KEYNOTE: The Cloud – Security Nightmare or Our Next Great Hope? (Keynote)
DATE: Thursday, February 27 at 3:30 p.m. PT
LOCATION: Moscone Center, Main Stage, San Francisco
SPEAKERS: Philippe Courtot, chairman and CEO, Qualys
OVERVIEW: Security professionals in general distrust the cloud; they are concerned about losing control, fly-by-night third party solutions, privacy and surveillance. However, the cloud provides a way to address issues such as the vanished perimeter, ubiquitous connected devices and new categories of attack. This keynote will discuss how we can shift the dynamic and use the cloud to defend against the increasing security challenges we are facing.

Additional Qualys speaking engagements

In addition to the keynote session, company executives and researchers will offer insight on current threats and industry trends related to browser security, vulnerabilities within popular embedded devices, and how to best drive effective security programs across government agencies and enterprises.

SESSION: Continuous Monitoring with the 20 Critical Security Controls (SPO1-W02)
DATE: Wednesday, February 26 at 9:20 a.m. PT
LOCATION: Room 131
SPEAKERS: Wolfgang Kandek, CTO, Qualys
OVERVIEW: The 20 Critical Security Controls (CSC) outline a practical approach to implementing security technologies by providing proven guidelines for protecting IT environments. Continuous monitoring plays a critical role in implementing the 20 CSC, and the good news is that there are new tools that can help automate adoption of the 20 CSC. This session will detail how to use these tools to protect corporate environments and keep your data secure.
 
SESSION Is Your Browser a User Agent, or a Double Agent (DSP-R04A)
DATE Tuesday, February 27 at 12:00 p.m. PT
LOCATION Room 2006
SPEAKERS Mike Shema, director of engineering, Qualys
OVERVIEW:  Privacy shouldn't be an afterthought in the browser. Data security within web and mobile apps relies on technical controls such as same-origin policy and sandboxing. As browsers add more complex features, the industry must weigh the trade-off between improving APIs for developers and limiting the ability of attackers to abuse those APIs. This presentation will cover privacy threats that apps may encounter via the browser. 

Qualys will also showcase customer case studies, security research and demonstrations in its booth #2821 Moscone North during the conference. The booth will also feature:

EVENT:  Press Conference: Introducing a New Free Service in Collaboration with the SANS Institute, the Council of CyberSecurity and the State of Colorado
DATE Wednesday, February 26 at 11:30 a.m. PT
SPEAKERS: Alan Paller, director of research, SANS Institute
  Jane Lute, president and CEO, Council on CyberSecurity
  Jonathan Trull, CISO, State of Colorado
  Wolfgang Kandek, CTO, Qualys
OVERVIEW: Companies and organizations are under siege by online attacks, many of which could be mitigated. This special booth session will feature a panel of respected information security luminaries who will discuss the history of the SANS 20 Critical Security Controls, reveal information on the how the most prevalent attacks can be addressed by the controls and how companies today can effectively adopt them to strengthen security.
   
EVENT:  Book Signing and Q&A: What Everyone Needs to Know About Today's Cyberthreats
DATE Wednesday, February 26 from 4:00 – 6:00 p.m. PT
Author P.W. Singer, senior fellow and director of the Center for 21st Century Security and Intelligence at the Brookings Institution.
  Presentation by Singer with Q&A to follow conducted by Joseph Menn, cyber security journalist and author.

Also next week, at BSidesSF 2014, taking place February 23 – 24 in San Francisco, Qualys Director of Intelligence Billy Rios will present new research on vulnerabilities found in Industrial Control Systems (ICS) and popular embedded devices.

SESSION ICS and Embedded Security Research – A Primer
DATE Monday, February 24 at 5:00 p.m. PT
LOCATION DNA Lounge
SPEAKERS Billy Rios, director of intelligence, Qualys
OVERVIEW:  While technology advances with innovative approaches to solving problems and increasing productivity, the security of new devices and systems is often an afterthought. This session will cover methodologies for obtaining ICS software and hardware, and other industrial control devices, and assessing their security. The session will also include a real-time example of a vulnerability discovery in a popular embedded device.

More information on Qualys activities at RSA available at booth No. 2821, Moscone North or http://www.qualys.com/RSAC. Follow us on Twitter at @Qualys.

About Qualys

Qualys Inc. (Nasdaq:QLYS), is a pioneer and leading provider of cloud security and compliance solutions with over 6,700 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The QualysGuard Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations worldwide. The company is also a founding member of the Cloud Security Alliance (CSA). For more information, please visit www.qualys.com.

Qualys, the Qualys logo and QualysGuard are proprietary trademarks of Qualys, Inc. All other products or names may be trademarks of their respective companies.


            

Tags


Contact Data