QUALYS TO LEAD FOUR SESSIONS AT BLACK HAT AND DEF CON 2021

LAS VEGAS — Black Hat USA — August 2, 2021 — Qualys, Inc (NASDAQ: QLYS), a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions, will be leading four speaking sessions at Black Hat and DEF CON 2021. At this year’s show, Qualys is laser-focused on bringing more security to its customers through its holistic platform.

Qualys’ single unified platform empowers customers to gain the upper hand against ransomware and other sophisticated attacks by unifying their security strategy. Customers can tap capabilities that help them manage asset inventory, prioritize vulnerabilities, automate remediation with zero-touch patching and take an effective multi-vector approach to detect and respond to malicious attacks.

The latest Qualys solutions for strengthening defense against sophisticated attacks:
Stop by our virtual booth to learn more about our newest solutions:

  • Cybersecurity Asset Management (CSAM): Added to its Cloud Platform, CSAM helps security teams inventory their complete IT ecosystem, detect security gaps and respond to risk. Schedule a demo to see how CSAM enables security professionals to see the entire picture of their assets, from inventory to detection to response.
  • Zero Touch Patch Management: Qualys’ Zero Touch patching helps organizations proactively patch prioritized vulnerabilities with ‘intelligent’ automation – before attacks can exploit them. Schedule a demo to see how only Qualys can bridge the gap between IT and Security teams.

Attendees are welcome to join any of the following speaking sessions to learn more about Qualys and get insights on the latest threat intel:

Defense Strategies to Combat Sophisticated Ransomware and Multi-Vector Attacks

WHO: Shailesh Athalye, Senior Vice President, Product Management, Qualys
WHAT: Day in and day out, cybercriminals launch sophisticated attacks to discover assets connecting to your environment and exploit your ever-increasing attack surface. To defend themselves, companies need to detect attacks early, gather the intelligence to understand the attack, and prevent the attacks from occurring in the future. This session will dive into why multiple point solutions and manual security response strategies are no longer enough. More information can be found here.
WHEN: August 4, 11:30am PST – 12:20pm PST
WHERE: In-person session at Business Hall Theatre A

Taming Vulnerability Management Overload (Virtual)

WHO: Alan Shimel, CEO and Founder, MediaOps; Dr. Jason Gamage, Head of Information Security, Fashion Nova; Eran Livne, Director, Product Management, Qualys
WHAT: This session unpacks the importance of vulnerability patching to discuss why companies fail to patch promptly – even when patches are available – and other barriers companies face that delay patching. This spokesperson bench will share strategies to prioritize the right set of vulnerabilities and provide tips for reducing risk with efficient patch deployment models. More information can be found here.
WHEN: August 4, 10:50am PST – 11:10am PST

Reinventing Asset Inventory for Security (Virtual)

WHO: David Spark, CISO Podcast; Ben Carr, CISO, Qualys; Ed Rossi, VP Product Management, Qualys
WHAT: Today’s IT environments are growing increasingly complex and securing them is even more so. The rapid expansion and adoption of new technologies wreak havoc on security teams as they attempt to manage and secure an ever-changing landscape. Join us to explore how CISOs use inventory to secure their environments and the role asset inventory plays in your overall security strategy. More information can be found here.
WHEN: August 5, 11:20am PST – 12:10pm PST

Tenacity: An Adversary Emulation Tool (Virtual)

WHO: Atul Nair, Malware Researcher, Qualys; Harshal Tupsamudre, Senior Threat Researcher, Qualys
WHAT: Persistence consists of techniques that adversaries use to maintain their foothold on systems across restarts and is one of the more sought-after techniques of an attacker. Qualys leveraged data from MITRE ATT&CK and open-source cyber threat intelligence to understand how adversary achieves persistence. Qualys created Tenacity, a lightweight adversary emulation tool that emulates over 30+ persistence techniques using 100+ procedures employed by attackers in the wild. More information can be found here.
WHEN: August 6-8, 2021