www.qualys.com
Open in
urlscan Pro
64.39.96.133
Public Scan
Submitted URL: https://event.qualys.com/dc/qEtCYPdDrgh7DbDU2Hwx5hyfqwtJEns66rtPbIZYP0iqhwkqTNG6X4BGcwpgkpwqigV8CWzsi8d1BCZ6HSCaz9Mg4NyEW...
Effective URL: https://www.qualys.com/qsc/2024/emea/?utm_source=marketo&utm_medium=email&utm_campaign=emea-event-qscemea-april2024&lea...
Submission: On March 01 via manual from GB — Scanned from GB
Effective URL: https://www.qualys.com/qsc/2024/emea/?utm_source=marketo&utm_medium=email&utm_campaign=emea-event-qscemea-april2024&lea...
Submission: On March 01 via manual from GB — Scanned from GB
Form analysis
0 forms found in the DOMText Content
We value your privacy We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Customize Reject All Accept All Customize Consent Preferences We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below. The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... Show more NecessaryAlways Active Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data. No cookies to display. Functional Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features. No cookies to display. Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc. No cookies to display. Performance Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. No cookies to display. Advertisement Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns. No cookies to display. Reject All Save My Preferences Accept All Powered by Qualys Security Conference * Locations Register Qualys Security Conference Close * Upcoming Events – London 2020 – Overview – Speakers – Agenda – Highlights – Venue & Travel – Register * QSC Munich – Jan 21, 2020 – Munich 2020 – Overview – Speakers – Agenda – Highlights – Venue & Travel – Register * QSC Paris – Jan 23, 2020 – Paris 2020 – Aperçu – Speakers – Programme – Highlights – Informations pratiques – Register * QSC24 EMEA -------------------------------------------------------------------------------- * Watch Past Events * QSC23 Americas * QSC23 Mumbai * QSC23 Munich * QSC23 London Register * QSC EMEA * Speakers * Agenda * Highlights * Venue & Travel * Code of Conduct * Register. There's no cost DE-RISK YOUR BUSINESS With so many disparate tools to measure and manage risk these days, it’s harder than ever to quantify the impact of cyber risk on your businesses. Join us in person to find out how today’s security leaders are evolving from enumerating risk to eliminating it. You’ll hear from industry-leading thought leaders, Qualys customers, and product experts on the latest strategies and tactics being used to measure, communicate, and eliminate cyber risk to drive better business outcomes. KEYNOTE SPEAKERS Bio SUMEDH THAKAR PRESIDENT AND CEO, QUALYS Bio LISA FORTE PARTNER, RED GOAT CYBER SECURITY FEATURED SPEAKERS Bio SAM EATON HEAD OF IT SECURITY, AB MAURI Bio CHINTAN GURJAR THREAT AND VULNERABILITY MANAGER, MARKS AND SPENCER Bio CLEMENT FOUQUE VULNERABILITY MANAGEMENT LEAD, ELASTIC Bio SHAILESH ATHALYE SENIOR VICE PRESIDENT, PRODUCT MANAGEMENT, QUALYS Bio KEVIN O'KEEFE SENIOR SECURITY SOLUTIONS ARCHITECT, QUALYS AGENDA kick off QSC on the Road on Tuesday, April 16. Meet old friends, make new ones, enjoy cocktails, and connect with Qualys experts and peers. TRAINING SESSIONS * TRAINING AGENDA Tue, April 16 CONFERENCE SESSIONS * CONFERENCE AGENDA Wed, April 17 9:00 – 9:45 AM Registration 9:45 – 11:00 AM Operationalize Qualys TruRisk and Transform Threats Into Opportunities Join us as we discuss Risk Based Vulnerability Management, and how using threat intelligence can reduce the vulnerability burden, whilst reducing risk faster. In this session we will cover how to use Qualys to identify known and unknown assets, accurately assess those assets and add business context to those assets. Once we have identified the assets, we will discuss how we add threat intelligence to help your teams de-risk your business. 11:00 – 11:30 AM Coffee Break 11:30 – 13:00 PM Training Session 1 Qualys Remediationathon Join us as we look at Qualys Patch Management best practices, and then carry out a "Remediationathon" with all attendees gaining access to a lab environment to see who can create the most secure lab. Various prizes will be given out for those with the most patched/secured assets. or Web Application Scanning Dynamic App Security Testing (DAST) is becoming an ever more important tool in a developer’s and security professional’s toolkit. Qualys Web Application Scanning (WAS) has been and continues to be a go-to solution for many security experts and developers over the years. This session will help you understand in more detail what the WAS module can mean for you as a security expert, or as a developer, how it can integrate into your application development pipelines and what touchpoints exist between Qualys WAS and the rest of the Qualys ecosystem. 13:00 - 14:00 PM Lunch 14:00 – 14:50 PM Training Session 2 Custom Assessment and Remediation This 50-minute workshop will teach you how Qualys Custom Assessment and Remediation (CAR) can help solve unique challenges. You will learn the CAR workflow and how to implement a script. or TotalCloud Join our training on Qualys TotalCloud to learn how to discover, assess, prioritize, and remediate vulnerabilities and misconfigurations across a multi-cloud environment. 14:50 – 15:10 PM Tea Break 15:10 – 16.00 PM Training Session 3 Get Ready for PCI DSS 4.0 with the Qualys Platform Join us to learn how Qualys File Integrity Monitoring can be deployed to simplify meeting the new and changing requirements of PCI DSS 4.0. or Manage the Risk of Your Supply Chain: Software Composition Analysis, SBOM and Open-Source Software Security This session will detail how Qualys Software Composition Analysis can give you visibility into your software supply chain and mitigate risks associated with open-source and third-party software components like Log4j and OpenSSL. 16:00 PM Drinks Reception Register 8:30 AM Registration and Coffee 9:10 AM Welcome to QSC EMEA 9:15 - 10:00 AM External Keynote Lisa Forte, Partner, Red Goat Cyber Security Lisa Forte's bio 10:00 - 10:50 AM Qualys Keynote Sumedh Thakar, President and CEO, Qualys Sumedh Thakar's bio 10:50 - 11:15 AM Coffee Break 11:15 - 12:00 PM Qualys Platform Roadmap and Strategy Shailesh Athalye Senior Vice President, Product Management, Qualys Shailesh Athalye's bio 12:00 – 12:20 PM Qualys Demo 12:20 – 13:00 PM VMDR, The Journey to Risk Management and Beyond Understand why organisations are moving from the traditional VM scanning to a full lifecycle program to reduce risk. Join the team as we discuss why and how you make the step change to a proactive risk reduction. 13:00 – 14:00 PM Lunch 14:00 – 14:20 PM Operations Track Remediate Vulnerabilities and Misconfigurations with Automation and Intelligent Workflows Clement Fouque, Vulnerability Management Lead, Elastic Management Track Streamlining Operations with Consolidation and Automation 14:20 – 14:35 PM Operations Track Remediating the Nightmares: Preparing to Defend Against Multi-channel Vulnerabilities Management Track Interpreting your TruRisk, Tech Debt and Attack Surface Reports 14:35 – 15:00 PM Operations Track Changing Hearts and Minds to Remediate Risk Using Quays Remediation Strategies Sam Eaton, Head of IT Security, AB Mauri Kevin O’Keefe, Senior Security Solutions Architect, Qualys Management Track Adopting a Risk-Based Vulnerability Management (RBVM) program Chintan Gurjar, Threat & Vulnerability Manager, Marks & Spencer 15:00 – 15:25 PM Operations Track What have we learned with CSAM and ITSM and how can you all benefit? Management Track The Power of TruRisk: Building Business Value, Trust and Industry Benchmarking 15:25 – 15:45 PM Operations Track Practical Measures for PCI 4.0 Management Track The Power of Prioritisation and Targeting Risk 15:45 - 16:10 PM Tea Break 16:10 – 16:35 PM Measuring and Detecting Cloud Risks with Artificial Intelligence 16:35 – 17:00 PM Measure, Communicate and Eliminate using the Power of AI 17:00 – 17:10 PM Closing Remarks 17:10 – 19:00 PM QSC Reception Register CONFERENCE HIGHLIGHTS GO BEYOND ENUMERATING RISK. Simply calculating the vulnerabilities that cyber risk poses to your business is no longer enough. See the latest strategies and innovations leading security experts are implementing to quantify the impact of cyber risk on their businesses so they can focus on the vulnerabilities that matter most. GET INSPIRED. Engage with Qualys’ customer-facing teams and your peers around best practices and user case studies for applying security automation to real-world challenges. SHARPEN YOUR EXPERTISE. One day of free training covers forward-looking strategies, best practices to improve effectiveness and productivity, and core and expanded product features to up-level your security program. WHO SHOULD ATTEND CIOs, CSOs and CTOs; directors and managers of network, security and cloud; developers and DevSecOps practitioners; Qualys partners and consultants; or any forward-thinking security professionals. Click here to read insights from last year’s QSC EMEA Register HILTON PARK LANE LONDON, UNITED KINGDOM Qualys Security Conference will be held at the Hilton Park Lane. Hilton Park Lane 22 Park Ln, London W1K 1BE, United Kingdom T: +44 20 7836 2400 Hilton Park Lane - London, United Kingdom CONFERENCE PRICING Attendance at QSC is complimentary. This includes access to all general sessions, breakfast, lunch, breaks, and training. Travel and hotel accommodations are not included with QSC or pre-conference training. REGISTER TODAY. Join us to learn how to effectively secure your hybrid IT environment, streamline your security and compliance initiatives and enable digital transformation. There is no cost to attend this event. Register * #qsc2023 * QSC23 Highlights * QSC Blog LOCATIONS * QSC24 Americas * QSC24 EMEA * QSC23 Americas * QSC23 Mumbai * QSC23 Munich * QSC23 London * Phone: +1 (650) 801 6100 * For questions, email us at: qsc@qualys.com * To subscribe to QSC updates: Get Notified CHINTAN GURJAR THREAT AND VULNERABILITY MANAGER, MARKS AND SPENCER Chintan Gurjar is an experienced cybersecurity expert with over 12 years of dynamic experience. Chintan specializes in various areas, including vulnerability management, threat intelligence, penetration testing, and attack surface management. He has worked with a diverse range of clients, from agile consulting firms to large-scale retail organizations on a global level. Chintan possesses a wealth of core competencies, including Risk-Based Vulnerability Management, Penetration Testing & Red Teaming, Attack Surface Management, Threat Intelligence, and proficiency in Security Operation Center. He has held esteemed roles such as Threat & Vulnerability Manager at M&S, Global Senior Vulnerability Management Analyst at TikTok, Security Engineering Manager at Tesco, and Cybersecurity Manager at KPMG. Chintan’s academic credentials are equally impressive, with an MSc in Computer Security & Forensics from the University of Bedfordshire. He also carries numerous industry certifications, including OSCP, CEH, ACCISO, CTIA, CCFH, CCFA, and SANS MGT516. Apart from being an expert in his field, he has co-trained at the prestigious HackCon Norwegian cybersecurity conference. His contributions to the cybersecurity domain have earned him recognition in multiple Bug-Bounty programs and official CVE entries for identifying key vulnerabilities. FELIKS VOSKOBOYNIK GROUP CHIEF INFORMATION SECURITY OFFICER, A.S. WATSON GROUP Feliks is currently the Global CISO at AS Watson, the largest health and beauty retailer. His focus has been to standardize cyber security across the Group and to ensure that the Group’s business units are cyber resilient. Over the last several years, he streamlined the Group’s cyber strategy and developed Cyber as a Group Service (CaaGS). CaaGS is a service, consisting of multiple tools and processes, provided to the BUs to ensure they are protected against attacks in our most critical areas like eCommerce, stores and offices. He is also responsible for the management of the cyber team across Europe and Asia, developing and maintaining policies, training and standards, setting up our Security Operations Centre, vulnerability management programmes, XDR technologies and the roll out the Information Security Standard of Good Practice Framework across the Group. Feliks combines over 15 years of privacy/cyber security and IT experience including roles at Shell and Unilever. Feliks is a visionary leader in the area of cyber security, who has managed to change the perception and mindsets of cyber at company levels, whether amongst employees or board members, by bringing together simple and ‘fit-for-purpose’ cyber security strategies. Feliks also takes a common sense and pragmatic approach to cyber security, tackling cyber risk as a business issue and not just an IT issue. KEVIN KEEFE SENIOR SECURITY SOLUTIONS ARCHITECT, QUALYS Kevin O’Keefe is a Senior Security Solutions Architect for EMEA North at Qualys, a pioneer and leading provider of disruptive cloud-based IT, security and compliance solutions designed to streamline and consolidate customer’s security and compliance solutions in a single platform. Kevin has extensive experience in the cybersecurity industry, having worked in two FTSE 100 organisations delivering critical Cyber security projects. Kevin joined Qualys in 2019, after successfully deploying a worldwide vulnerability management and remediation program, and has since worked with Qualys’ largest customers to improve theirs. SUMEDH THAKAR PRESIDENT AND CEO, QUALYS As President and CEO, Sumedh leads the company’s vision, strategic direction and implementation. He joined Qualys in 2003 in engineering and grew within the company, taking various leadership roles focused on helping Qualys deliver on its platform vision. From 2014 to 2021, he served as Qualys’ Chief Product Officer, where he oversaw all things product, including engineering, development, product management, cloud operations, DevOps, and customer support. A product fanatic and engineer at heart, he is a driving force behind expanding the platform from Vulnerability Management into broader areas of security and compliance, helping customers consolidate their security stack. This includes the rollout of the game-changing VMDR (Vulnerability Management, Detection and Response) that continually detects and prevents risk to their systems, Multi-Vector EDR, which focuses on protecting endpoints as well as Container Security, Compliance and Web Application Security solutions. Sumedh was also instrumental in the build-up of multiple Qualys sites resulting in a global 24x7 follow-the-sun product team. Sumedh is a long-time proponent of SaaS and cloud computing. He previously worked at Intacct, a cloud-based financial and accounting software provider. He also worked at Northwest Airlines developing complex algorithms for its yield and revenue management reservation system. Sumedh has a bachelor’s degree in computer engineering with distinction from the University of Pune. CLEMENT FOUQUE VULNERABILITY MANAGEMENT LEAD, ELASTIC Clement Fouque is a Principal Information Security Analyst at Elastic, where he leads the vulnerability management program within the InfoSec department. Before joining Elastic, Clément worked as a Microsoft SharePoint Consultant in a consulting company and then at Richemont, the second biggest luxury company in the world. He internally moved to the InfoSec department and worked as an incident response analyst and a red team coordinator. SHAILESH ATHALYE SENIOR VICE PRESIDENT, PRODUCT MANAGEMENT, QUALYS INC. As Senior Vice President of Product Management, Shailesh leads the product management team and drives the Qualys product vision helping customers assess and improve their IT, security and compliance posture. Since joining Qualys in 2012, he has worked in various security and compliance roles driving innovative solutions, including remote endpoint protection, endpoint detection and response, and SaaS security. In addition, Shailesh headed engineering, research and product management for Qualys Policy Compliance and File Integrity Monitoring, where he helped customers go beyond compliance to drive their IT GRC objectives. Before Qualys, he focused on security research for Symantec ESM and Compliance solutions. Shailesh holds a master’s in computer applications (MCA) from the Vishwakarma Institute of Technology and has various security certifications including CISA, CRISC, CISM. He is also a regular speaker at industry conferences. SAM EATON HEAD OF IT SECURITY, AB MAURI I am currently Head of IT Security at AB Mauri, a global yeast & bakery ingredients organisation with businesses spanning across 32 countries. My role encompasses the creation, maintenance, and delivery of our global cyber security strategy. Having held various IT roles in my career, in 2018, I embarked on my journey in cyber security. Since then, I have not only enjoyed the challenges and rewards this field offers but also had the privilege of collaborating with an exceptional and supportive community of professionals. I am looking forward to sharing my experiences and insights at this conference. LISA FORTE PARTNER, RED GOAT CYBER SECURITY Lisa Forte is a highly respected Cyber Security Expert with an impressive background in the field. Her career began with her work to combat piracy off the coast of Somalia, followed by a role in UK Counter Terrorism Intelligence, and eventually moving on to one of the UK Police Cyber Crime Units. In 2017, she co-founded Red Goat Cyber Security and has since become one of the most prominent voices in the industry. Lisa is an internationally recognised speaker, named as one of the Top 100 Women in Tech, who is renowned for her expertise in cyber crisis management, ransomware, risk management, insider threats, and social engineering. Her extensive knowledge has helped large companies improve their incident response plans and rehearse for potential cyber-attacks. She has also appeared in documentaries and on BBC’s Newsnight, and is a regular contributor to national news, radio, and newspapers. As a speaker, Lisa is known for her energetic presentations that draw on storytelling and real-life experiences. She has a passion for the “tech for good” philosophy and co-founded the Cyber Volunteers 19 movement in 2020 to help protect hospitals from cyber-attacks during the pandemic. She also co-founded Respect In Security, which aims to combat hate and harassment in the industry. Lisa’s presentations are not limited to cyber security, however. As an experienced climber, mountaineer, and caver, she is able to offer unique perspectives on risk management and motivation. Her dynamic and engaging approach, coupled with her personal experiences and research, make her a highly sought-after keynote speaker, panel chair, and conference chair. Lisa Forte is also an experienced cyber security trainer, capable of effectively communicating her message to all types of audiences. Notice. We use cookies to optimize our website. By continuing to use our site, you accept our privacy policy. Yes, I accept Cookies No thanks