Black Hat USA 2018 Best Practices Videos

Robert Dell'Immagine

Last updated on: September 6, 2020

Watch the presentations from the Qualys booth at Black Hat USA 2018, available online now. Learn how your peers are securing their environments and see the breadth and depth of Qualys solutions.

Industry-Leading Best Practices

Qualys customers explain how they run their industry-leading security programs.


Scaling a Vulnerability Management Program While Reducing Network Impact
Josh Oquendo, Threat Intelligence Analyst, Finastra


How to Build a Successful Vulnerability Management Program for Medical Devices
Sarah Kennedy, Security Vulnerability Engineer, HCA Healthcare
Robert Sloan, Security Vulnerability Engineer, HCA Healthcare

 


How to Reboot Vulnerability Management for Modern IT and Mature Business Needs
Brian Canaday, IT Security Analyst / Engineer, CSAA Insurance Group

 


Using Asset Tags to Increase Effectiveness of Your VM Program
Abe de los Reyes, Security Engineer, Cyber-Threat Management Team, Citrix
Kena Deal, Security Engineer, Cyber-Threat Management Team, Citrix

 

Technology Presentations

Learn how to use the latest innovations of the Qualys Cloud Platform to extend your security programs.


Native Integration of Real-Time Network Analysis with the Qualys Cloud Platform
Sumedh Thakar, Chief Product Officer, Qualys

 


Endpoint Breach Prevention by Reducing Attack Surfaces
Chris Carlson, Vice President of Product Management, Qualys

 


Qualys Container Security – Visibility and Security for Containers from Build to Deployments
Hari Srinivasan, Director of Product Management, Qualys

 


The Art of Vulnerability Management: from Running Scans to Managing Risk
Jimmy Graham, Director of Product Management, Qualys

 


Get Full Visibility of Both Certificates and Underlying SSL/TLS Configurations and Vulnerabilities
Asif Karel, Director of Product Management, Qualys

 


Assess All Web Applications and APIs for Better Security Hygiene
Dave Ferguson, Director of Product Management, Qualys

 


Incorporate Visibility of Inaccessible or Sensitive Assets into Your Overall Vulnerability and Compliance Program
Tim White, Director of Product Management, Qualys

 


A 360-degree Approach to Securing Public Clouds
Hari Srinivasan, Director of Product Management, Qualys

 


Building Bridges and Not Walls – A Shift to Get into DevSecOps
Hari Srinivasan, Director of Product Management, Qualys

Share your Comments

Comments

Your email address will not be published. Required fields are marked *