The Qualys CEO Philippe Courtot will deliver the opening keynote presentation at CSA Summit during RSA Conference 2015. The keynote discusses how the cloud has forced enterprises to consider adopting new and more advanced security standards to secure and maintain data sovereignty.
Qualys experts will present multiple track sessions during the RSA Conference. In addition, Qualys will host industry leaders such as Microsoft, Time Warner, Nationwide, BMC, Splunk, the University of Colorado and Catholic Health who will discuss best practices and case studies at the Qualys booth #N3421.
Cloud Without Borders: Paving the Way for Global Security and Privacy
Monday, April 20, 2015, 9:00am-12:00pm PT, Moscone West, Room 2014
Philippe Courtot, Chairman and Chief Executive Officer, Qualys
Cloud security and privacy concerns are now front and center for businesses of any size, governments and individuals. This keynote discusses the mind shift we must make to better address these challenges and highlights new approaches for ensuring data security and privacy across borders.
Bridging the Divide Between Security and Operations Teams
Tuesday, April 21, 2015, 1:10-2:00pm PT, Moscone North, Room 130
Jonathan Trull, Chief Information Security Officer, Qualys
Organizational Security and IT Operations teams (SecOps) have traditionally been siloed functions, making it difficult to quickly identify and respond to potential vulnerabilities and attacks. This presentation will discuss the SecOps gap and highlight the importance of bridging these two functions, to ultimately strengthen the overall security and compliance posture against potential attacks.
Getting a Jump on Hackers
Tuesday, April 21, 2015, 2:20-3:10pm PT, Moscone West, Room 2018
Wolfgang Kandek, Chief Technical Officer, Qualys
A successful security program is one where network perimeters are defined. Hackers constantly probe perimeters using automated tools to exploit any vulnerabilities. This session will discuss why it is necessary to continuously audit your perimeter, and provide best practices for mitigating risks in the same way hackers perpetually attempt to breakthrough.