Qualys at Black Hat USA 2018: Hear best practices from industry leaders
There will be no lack of interesting content from Qualys at Black Hat USA 2018 this year. Depending on you interests, you might want to make time for some of these talks and presentations. Visit Qualys at Booth #204 to hear best practices presentations from industry leaders.
Wednesday, August 8
10:20 – 10:45 AM
Endpoint Breach Prevention by Reducing Attack Surfaces
Chris Carlson, Vice President of Product Management, Qualys
The most scalable way to prevent breaches of endpoints, servers, and cloud workloads is to reduce the attack surface of the asset itself. Operational vulnerability management, remediation prioritization, transparent patching, secure configuration assessment, real-time activity monitoring, and active threat hunting delivered by a unified security platform can significantly reduce the likelihood of breaches by focusing on reducing the attack surface of enterprise IT environments. In this session, learn how to identify, remediate, detect, and respond to common and targeted attacks that can evade traditional and next-gen prevention technologies.
11:00 – 11:25 AM
How to Reboot Vulnerability Management for Modern IT and Mature Business Needs
Brian Canaday, IT Security Analyst / Engineer, CSAA Insurance Group
Vulnerability Management programs require new levels of immediacy, accuracy and scale as they mature. Brian Canaday will discuss how CSAA Insurance Group identified a misalignment of its VM program needs, tools and team, then planned and executed a VM program reboot to meet current perceptions and expectations of VM as a strategic part of security operations. This talk explains CSAA’s reboot process, including a gap analysis and a phased redeployment of the Qualys Cloud Platform and the Qualys Cloud Agent that delivered CSAA the ability to consume security and compliance data at the necessary scale and with immediacy needed to secure modern IT infrastructure, then report critical accurate and relevant findings to a variety of end users including executives, application, audit and IT teams.
11:40 AM – 12:05 PM
The Art of Vulnerability Management: from Running Scans to Managing Risk
Jimmy Graham, Director of Product Management, Qualys
To address the challenges of vulnerability detections increasing year over year, Qualys is introducing new ways to visualize vulnerability data, layering Real-time Threat Information on top of detected vulnerabilities to provide consistent and automated remediation prioritization. AssetView technology in Qualys Vulnerability Management allows users to instantly search across vulnerabilities and create dynamic widgets and dashboards within the VM module. See the new VM Dashboard and instant search capabilities, a demo of Qualys Threat Protection, as well as a sneak peek at our new Reporting Module that will unify reports across the Qualys Cloud Platform.
12:20 – 12:45 PM
How to Build a Successful Vulnerability Management Program for Medical Devices
Sarah Kennedy, Security Vulnerability Engineer, HCA Healthcare
Robert Sloan, Security Vulnerability Engineer, HCA Healthcare
For one enterprise-scale healthcare company, effective vulnerability management requires continued scanning of every networked device including non-traditional devices with known vulnerability assessment issues, and which become unresponsive from a scan. This talk highlights how HCA Healthcare’s Vulnerability Management team overcame these challenges and explains key elements of building a successful vulnerability management program for medical devices.
1:00 – 1:25 PM
Get Full Visibility of Both Certificates and Underlying SSL/TLS Configurations and Vulnerabilities
Asif Karel, Director of Product Management, Qualys
Risk management in the age of DevOps and public clouds requires organizations to automate real-time visibility and tracking of their SSL certificate deployments. Learn how Qualys CertView helps customers extend DevSecOps to prevent downtime and disruption, audit and compliance failures, and mitigate risks associated with expired or weak certificates and vulnerable TLS configurations.
1:40 – 2:05 PM
Qualys Container Security – Visibility and security for containers from Build to Deployments
Hari Srinivasan, Director of Product Management, Qualys
Containers are the most sought after development tool for microservices. Their simplicity and portability allow DevOps to create true agile builds within development cycles. However, this new kind of environment brings a new set of security threats at every phase of this cycle – from unvalidated software entering the environment, to secrets being leaked, to runtime drifting and breaking immutable behaviors. This session outlines common security risks and practical use cases across every phase in order to help security teams better understand how to efficiently manage security at the speed and scale of DevOps.
2:20 – 2:45 PM
Assess All Web Applications and APIs with Better Security Hygiene
Dave Ferguson, Director of Product Management, Qualys
Whether an organization has mature application security processes or strives only to meet regulatory compliance requirements, all of their web applications and HTTP-based APIs need some level of security testing. Learn how Qualys Web Application Scanning provides customers broad testing coverage across diverse environments and scales to work with any size application security program. We’ll discuss how WAS’ flexibility and cloud-based architecture allows for a practical approach to application security hygiene as well as due diligence for GDPR.
3:00 – 3:25 PM
Using Asset Tags to Increase Effectiveness of Your VM Program
Abe de los Reyes, Security Engineer, Cyber-Threat Management Team, Citrix
Kena Deal, Security Engineer, Cyber-Threat Management Team, Citrix
Asset identification based on OS, function and other known identifiers plays a critical role in successful vulnerability management programs at global scale. Learn why Citrix calls AssetView a priceless tool for identifying, managing and patching global assets. The presenters will explain the stages of their AssetView tagging deployment, how each contributed to significant strides in keeping assets organized, and how Citrix used Qualys AssetView tags to raise its patch success rate by 80% on some of its most critical systems in the last six months. This session also covers how asset tagging increases Citrix’ ability to find and dispose of abandoned systems, decreasing its overall threat landscape.
3:40 – 4:05 PM
Building Bridges and not walls – A shift to get into DevSecOps
Hari Srinivasan, Director of Product Management, Qualys
Learn how security teams can leverage automation to provide support at the speed and scale of DevOps. This talk outlines use cases and best practices from three customers who effectively managed to gain visibility and automate security practices in their DevOps pipelines.
4:20 – 4:45 PM
Gain Unprecedented Visibility with Global IT Asset Inventory
Pablo Quiroga, Director of Product Management, Qualys
The digital transformation and the ever-evolving cybersecurity threat landscape introduce new technology at increasing variety, scale and speed. Simultaneously, teams are trying to manage resources under budget constraints and with siloed security solutions. Learn to tackle these challenges by delivering unprecedented visibility into all environments with one tool: Qualys Asset Inventory – a single and unified solution that enables better collaboration and strategic planning across IT and Infosec. See how Asset Inventory discovers assets across global hybrid infrastructure, normalizes and categorizes each hardware and software, and enriches with non-discoverable asset intelligence such as vendor lifecycle information.
5:00 – 5:25 PM
Scaling a Vulnerability Management Program While Reducing Network Impact
Josh Oquendo, Threat Intelligence Analyst, Finastra
In order to provide faster detection and executive reporting, organizations such as Finastra are striving to scale vulnerability management programs while simultaneously reducing network impact. Josh Oquendo from Finastra will discuss his use cases of the Qualys Cloud Platform and Qualys Cloud Agent as well as practical advice that he employs at Finastra to achieve faster detection for executive reporting on newly released critical vulnerabilities. This talk features best practices to encourage strong inventory as a critical base plus real-world advice for Qualys Vulnerability Management users to strategically leverage scanners, agents, scan groups and scripts to optimize scanning at daily intervals.
5:40 – 6:05 PM
A 360-degree Approach to Securing Public Clouds
Hari Srinivasan, Director of Product Management, Qualys
Cloud is a core fabric of digital transformation, as users have a shared security responsibility with the cloud providers. This session will introduce the threats and solutions needed to secure cloud workloads and cloud infrastructure. Learn to gain visibility of your public clouds, secure workloads from both internal and perimeter vulnerabilities, and set up continuous security monitoring of cloud resources to avoid issues such as data leaks and cryptomining attacks through your cloud infrastructure.
6:20 – 6:45 PM
Incorporate Visibility of Inaccessible or Sensitive Assets into Your Overall Vulnerability and Compliance Program
Tim White, Director of Product Management, Qualys
Organizations using programmable logic controllers (PLC) and other secretive or disconnected assets can be challenged to incorporate them into the scope of their overall cybersecurity and risk program. Such assets do not allow traditional remote or agent-based scanning and thus remain outside the scope of security assessments. Learn how Qualys Offline Device Assessment, an extension of the Qualys sensor family, enables these organizations to enhance overall risk analysis by extending their single-pane-view of security and compliance to these inaccessible or sensitive assets.
Thursday, August 9
10:20 – 10:45 AM
Qualys Container Security – Visibility and security for containers from Build to Deployments
Hari Srinivasan, Director of Product Management, Qualys
Containers are the most sought after development tool for microservices. Their simplicity and portability allow DevOps to create true agile builds within development cycles. However, this new kind of environment brings a new set of security threats at every phase of this cycle – from unvalidated software entering the environment, to secrets being leaked, to runtime drifting and breaking immutable behaviors. This session outlines common security risks and practical use cases across every phase in order to help security teams better understand how to efficiently manage security at the speed and scale of DevOps.
11:00 – 11:25 AM
Scaling a Vulnerability Management Program While Reducing Network Impact
Josh Oquendo, Threat Intelligence Analyst, Finastra
In order to provide faster detection and executive reporting, organizations such as Finastra are striving to scale vulnerability management programs while simultaneously reducing network impact. Josh Oquendo from Finastra will discuss his use cases of the Qualys Cloud Platform and Qualys Cloud Agent as well as practical advice that he employs at Finastra to achieve faster detection for executive reporting on newly released critical vulnerabilities. This talk features best practices to encourage strong inventory as a critical base plus real-world advice for Qualys Vulnerability Management users to strategically leverage scanners, agents, scan groups and scripts to optimize scanning at daily intervals.
11:40 – 12:05 PM
Endpoint Breach Prevention by Reducing Attack Surfaces
Chris Carlson, Vice President of Product Management, Qualys
The most scalable way to prevent breaches of endpoints, servers, and cloud workloads is to reduce the attack surface of the asset itself. Operational vulnerability management, remediation prioritization, transparent patching, secure configuration assessment, real-time activity monitoring, and active threat hunting delivered by a unified security platform can significantly reduce the likelihood of breaches by focusing on reducing the attack surface of enterprise IT environments. In this session, learn how to identify, remediate, detect, and respond to common and targeted attacks that can evade traditional and next-gen prevention technologies.
12:20 – 12:45 PM
Using Asset Tags to Increase Effectiveness of Your VM Program
Abe de los Reyes, Security Engineer, Cyber-Threat Management Team, Citrix
Kena Deal, Security Engineer, Cyber-Threat Management Team, Citrix
Asset identification based on OS, function and other known identifiers plays a critical role in successful vulnerability management programs at global scale. Learn why Citrix calls AssetView a priceless tool for identifying, managing and patching global assets. The presenters will explain the stages of their AssetView tagging deployment, how each contributed to significant strides in keeping assets organized, and how Citrix used Qualys AssetView tags to raise its patch success rate by 80% on some of its most critical systems in the last six months. This session also covers how asset tagging increases Citrix’ ability to find and dispose of abandoned systems, decreasing its overall threat landscape.
1:00 – 1:25 PM
Gain Unprecedented Visibility with Global IT Asset Inventory
Pablo Quiroga, Director of Product Management, Qualys
The digital transformation and the ever-evolving cybersecurity threat landscape introduce new technology at increasing variety, scale and speed. Simultaneously, teams are trying to manage resources under budget constraints and with siloed security solutions. Learn to tackle these challenges by delivering unprecedented visibility into all environments with one tool: Qualys Asset Inventory – a single and unified solution that enables better collaboration and strategic planning across IT and Infosec. See how Asset Inventory discovers assets across global hybrid infrastructure, normalizes and categorizes each hardware and software, and enriches with non-discoverable asset intelligence such as vendor lifecycle information.
1:40 – 2:05 PM
How to Build a Successful Vulnerability Management Program for Medical Devices
Sarah Kennedy, Security Vulnerability Engineer, HCA Healthcare
Robert Sloan, Security Vulnerability Engineer, HCA Healthcare
For one enterprise-scale healthcare company, effective vulnerability management requires continued scanning of every networked device including non-traditional devices with known vulnerability assessment issues, and which become unresponsive from a scan. This talk highlights how HCA Healthcare’s Vulnerability Management team overcame these challenges and explains key elements of building a successful vulnerability management program for medical devices.
2:20 – 2:45 PM
A 360-degree Approach to Securing Public Clouds
Hari Srinivasan, Director of Product Management, Qualys
Cloud is a core fabric of digital transformation, as users have a shared security responsibility with the cloud providers. This session will introduce the threats and solutions needed to secure cloud workloads and cloud infrastructure. Learn to gain visibility of your public clouds, secure workloads from both internal and perimeter vulnerabilities, and set up continuous security monitoring of cloud resources to avoid issues such as data leaks and cryptomining attacks through your cloud infrastructure.
3:00 – 3:25 PM
How to Reboot Vulnerability Management for Modern IT and Mature Business Needs
Brian Canaday, IT Security Analyst / Engineer, CSAA Insurance Group
Vulnerability Management programs require new levels of immediacy, accuracy and scale as they mature. Brian Canaday will discuss how CSAA Insurance Group identified a misalignment of its VM program needs, tools and team, then planned and executed a VM program reboot to meet current perceptions and expectations of VM as a strategic part of security operations. This talk explains CSAA’s reboot process, including a gap analysis and a phased redeployment of the Qualys Cloud Platform and the Qualys Cloud Agent that delivered CSAA the ability to consume security and compliance data at the necessary scale and with immediacy needed to secure modern IT infrastructure, then report critical accurate and relevant findings to a variety of end users including executives, application, audit and IT teams.
3:40 – 4:05 PM
The Art of Vulnerability Management: from Running Scans to Managing Risk
Jimmy Graham, Director of Product Management, Qualys
To address the challenges of vulnerability detections increasing year over year, Qualys is introducing new ways to visualize vulnerability data, layering Real-time Threat Information on top of detected vulnerabilities to provide consistent and automated remediation prioritization. AssetView technology in Qualys Vulnerability Management allows users to instantly search across vulnerabilities and create dynamic widgets and dashboards within the VM module. See the new VM Dashboard and instant search capabilities, a demo of Qualys Threat Protection, as well as a sneak peek at our new Reporting Module that will unify reports across the Qualys Cloud Platform.
4:20 – 4:45 PM
Get Full Visibility of Both Certificates and Underlying SSL/TLS Configurations and Vulnerabilities
Asif Karel, Director of Product Management, Qualys
Risk management in the age of DevOps and public clouds requires organizations to automate real-time visibility and tracking of their SSL certificate deployments. Learn how Qualys CertView helps customers extend DevSecOps to prevent downtime and disruption, audit and compliance failures, and mitigate risks associated with expired or weak certificates and vulnerable TLS configurations.