In this age of instant gratification, businesses are finally able to catch up with their desire to have everything identified, prioritized, and remediated in real time. Practitioners can utilize the vulnerability detection and remediation cycle to establish efficient closed-loop processes for their organizations. Find out how to get started when you are staring down a mountain of vulnerability data, and learn how to sift out remediation processes with ease by spending time on the right vulnerabilities. See how sharing simple and actionable insights with your colleagues and executive team provides the assurance they need to know their vulnerability detection and remediation is accurate and in good hands.
HCA Healthcare has improved its vulnerability management processes by utilizing the Qualys Cloud Platform for quicker and more accurate assessment data. They have developed a process for maintaining unified visibility of hybrid IT environments and to maintain continued assessment of vulnerabilities across non-traditional devices without losing visibility throughout the full remediation process. This talk highlights how HCA Healthcare’s Vulnerability Management team utilizes Qualys, highlighting a specific process for non-traditional devices. Robert and Sarah will discuss lessons learned along the way of implementing Qualys over the past year, how they are able to utilize Threat Protection to achieve new capabilities and matured processes, and how they’ve been successful at maintaining a vulnerability management program for medical devices.
Sarah Kennedy, Security Vulnerability Engineer, HCA Healthcare
Robert Sloan, Security Vulnerability Engineer, HCA Healthcare
Searching through endpoint data for answers to pressing security problems has always been a challenge. Whether it’s finding the one critical server that is exhibiting strange behavior related to a recently uncovered threat, or seeing patterns across a large number of endpoints that indicate the presence of a botnet command and control mechanism, the answers are in the endpoint data. The integration of Qualys with Splunk offers security teams fast and effective analytic views into their data, elevating concerning patterns and security events into clearly understandable security dashboards. This presentation with show Splunk security dashboards based on data from Qualys Vulnerability Management, Policy Compliance, and Web Application Scanning. Learn how the wealth of security analysis and events generated by the combination of Qualys apps feeding Splunk’s Security Information and Event Management (SIEM) platform can find the threats hiding in your environment.
Don Leatham, Global Strategic Alliances - Security Markets, Splunk
With an ever-increasing rate of cybersecurity incidents across multiple industries in the last year, Experian has taken a committed approach to evaluating its own processes, and setting a new bar for agility and re-engineering of its technology.
This talk explains the organizational, cultural and technological shifts Experian has used to transform its security approach over the past year, and the role that real-time visibility of security and compliance posture played along that journey.
Learn how the daily life of a security staff is impacted when a competitor is breached, the challenges to overcome when transforming security culture, the process and technical shifts required to increase security agility and the steps to leveraging a crisis as an opportunity to advance your security approach.
Peeyush Patel, VP of Information Security, Experian