Site icon Ryadel

Qualys Webcast - Definizione delle Priorità sulle Vulnerabilità di un ambiente IT

Qualys Webcast - Prioritization of Vulnerabilities in a Modern IT Environment

Se si ha interesse a tenere traccia di ciò che sta accadendo in termini di sicurezza IT in questo momento storico, difficilmente si può fare a meno di Qualys: non soltanto per i servizi gratuiti e premium offerti, ma anche per il gran numero di corsi, webinar e webcast che la nota società dedicata alla sicurezza in ambito web pubblica regolarmente sul proprio sito web e sulla piattaforma BRIGHTTalk. Questa opportunità di formazione online è un'insostituibile risorsa per i responsabili IT e i professionisti che operano nel settore, anche grazie alla possibilità - grazie alla summenzionata piattaforma BrightTalk - di poter fruire gratuitamente dell'intero catalogo di webinar realizzati, sotto forma di podcast, dalla sezione dedicata Qualys Webcast Library presente sul sito ufficiale.

NOTA BENE: Nessuno in questo blog lavora per Qualys e non esiste alcun rapporto o collegamento (economico e non) tra Qualys e il presente sito. Questo articolo è unicamente frutto dell'interesse nei confronti del corso da parte di chi scrive.

Il nome del prossimo webcast è "Prioritization of Vulnerabilities in a Modern IT Environment": la data prevista è il 14 marzo 2018, alle 19:00 CET.

Ecco una breve presentazione, tratta dal sito web ufficiale di Qualys, che descrive gli argomenti e i punti salienti del Webinar: nel caso in cui vi interessi, ci vediamo lì!

Introduction

The combination of today’s fast changing IT environments, increasingly common “headline” vulnerabilities and swift weaponizing of exploits requires a more automated, continuous and precise approach. Defense methods such as IT asset inventory, vulnerability management, threat prioritization, and patch deployment all must adapt with new speed and scale to deliver continuous visibility of global IT assets and environments for the realities facing today’s digital business.

Join Qualys along with featured guest speaker Josh Zelonis, Senior Analyst at Forrester, to discuss the practical realities of prioritization in the era of digital transformation, industrious attackers and headline vulnerability disclosures. How can security teams sort through thousands or millions of vulnerabilities in time to prioritize a subset of those, act appropriately, then report up the chain?

By attending this webcast, you will understand:

  • What this new era of branded vulnerabilities and rapid exploitation means for IT security teams already faced with increased scale and sprawl of cloud, hybrid, on-premises and containerized environments
  • How teams can streamline capabilities in order to simplify security with fewer staff resources
  • How to unify your approach to asset inventory, vulnerability management threat intelligence as vulnerability risk management
  • Why continuous visibility across global IT assets and environments is essential for automating security

Speaker Bio

Josh Zelonis

Josh Zelonis is a senior analyst at Forrester, serving Security & Risk Professionals. He covers security architecture and operations, with a focus on cyber threat intelligence, detection, and response. In this role, he helps clients continuously adapt their architecture, policies, and processes to evolving threats while also developing robust incident response capabilities that limit the impact of breaches. His research focuses on threat intelligence, vulnerability assessment/management, malware analysis, and incident response.

Jimmy Graham

Jimmy Graham, Director of Product Management at Qualys, has been deeply involved in information security and vulnerability management for over 10 years, in both higher education and corporate environments. He has managed teams covering firewalls, SIEM, IDS, application security, vulnerability management, penetration testing, governance, and compliance.

Exit mobile version