HCA Healthcare has improved its vulnerability management processes by utilizing the Qualys Cloud Platform for quicker and more accurate assessment data. They have developed a process for maintaining unified visibility of hybrid IT environments and to maintain continued assessment of vulnerabilities across non-traditional devices without losing visibility throughout the full remediation process. This talk highlights how HCA Healthcare’s Vulnerability Management team utilizes Qualys, highlighting a specific process for non-traditional devices. Robert and Sarah will discuss lessons learned along the way of implementing Qualys over the past year, how they are able to utilize Threat Protection to achieve new capabilities and matured processes, and how they’ve been successful at maintaining a vulnerability management program for medical devices.
Sarah Kennedy, Security Vulnerability Engineer, HCA Healthcare
Robert Sloan, Security Vulnerability Engineer, HCA Healthcare
Searching through endpoint data for answers to pressing security problems has always been a challenge. Whether it’s finding the one critical server that is exhibiting strange behavior related to a recently uncovered threat, or seeing patterns across a large number of endpoints that indicate the presence of a botnet command and control mechanism, the answers are in the endpoint data. The integration of Qualys with Splunk offers security teams fast and effective analytic views into their data, elevating concerning patterns and security events into clearly understandable security dashboards. This presentation with show Splunk security dashboards based on data from Qualys Vulnerability Management, Policy Compliance, and Web Application Scanning. Learn how the wealth of security analysis and events generated by the combination of Qualys apps feeding Splunk’s Security Information and Event Management (SIEM) platform can find the threats hiding in your environment.
Don Leatham, Global Strategic Alliances - Security Markets, Splunk
With an ever-increasing rate of cybersecurity incidents across multiple industries in the last year, Experian has taken a committed approach to evaluating its own processes, and setting a new bar for agility and re-engineering of its technology.
This talk explains the organizational, cultural and technological shifts Experian has used to transform its security approach over the past year, and the role that real-time visibility of security and compliance posture played along that journey.
Learn how the daily life of a security staff is impacted when a competitor is breached, the challenges to overcome when transforming security culture, the process and technical shifts required to increase security agility and the steps to leveraging a crisis as an opportunity to advance your security approach.
Peeyush Patel, VP of Information Security, Experian
This case study session explains how a large services firm with limited resources worked with Secureworks for guidance on their vulnerability management program and leveraged the Qualys Cloud Platform along with Secureworks' in-house vulnerability management experts to more effectively manage and interpret the scans as well as to prioritize remediation. Learn how this company was only leveraging 20% of the checks that Qualys had available to them because they were not taking full advantage of the authenticated scanning. With the comprehensive scanning capabilities of the Secureworks Vulnerability Management Service (VMS) service with Qualys®, enhanced with threat intelligence, learn how authenticated scanning with Qualys can reveal huge blind spots in your environment. Also, learn more about how the reporting guidance provided by the Secureworks VMS team can help you tell the story of what has been fixed as well as what is still remaining to be done.
View an introduction to the Qualys Threat Protection. See how it correlates your vulnerability data with external threat information. Threat Protection includes a live threat feed and real-time threat indicators. Look for specific threats and how to apply the threat feed to only a subset of your assets using asset tags.