www.qualys.com Open in urlscan Pro
64.39.96.133  Public Scan

Submitted URL: https://event.qualys.com/dc/qEtCYPdDrgh7DbDU2Hwx5hyfqwtJEns66rtPbIZYP0iqhwkqTNG6X4BGcwpgkpwqigV8CWzsi8d1BCZ6HSCaz9Mg4NyEW...
Effective URL: https://www.qualys.com/qsc/2024/emea/?utm_source=marketo&utm_medium=email&utm_campaign=emea-event-qscemea-april2024&lea...
Submission: On March 01 via manual from GB — Scanned from GB

Form analysis 0 forms found in the DOM

Text Content

We value your privacy

We use cookies to enhance your browsing experience, serve personalized ads or
content, and analyze our traffic. By clicking "Accept All", you consent to our
use of cookies.

Customize Reject All Accept All
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions.
You will find detailed information about all cookies under each consent category
below.

The cookies that are categorized as "Necessary" are stored on your browser as
they are essential for enabling the basic functionalities of the site. ... Show
more


NecessaryAlways Active

Necessary cookies are required to enable the basic features of this site, such
as providing secure log-in or adjusting your consent preferences. These cookies
do not store any personally identifiable data.

No cookies to display.

Functional

Functional cookies help perform certain functionalities like sharing the content
of the website on social media platforms, collecting feedback, and other
third-party features.

No cookies to display.

Analytics

Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics such as the number of
visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance

Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.

No cookies to display.

Advertisement

Advertisement cookies are used to provide visitors with customized
advertisements based on the pages you visited previously and to analyze the
effectiveness of the ad campaigns.

No cookies to display.

Reject All Save My Preferences Accept All
Powered by

Qualys Security Conference

 * Locations

Register

Qualys Security Conference

Close
 * Upcoming Events
   – London 2020 – Overview – Speakers – Agenda – Highlights – Venue & Travel –
   Register
 * QSC Munich – Jan 21, 2020
   – Munich 2020 – Overview – Speakers – Agenda – Highlights – Venue & Travel –
   Register
 * QSC Paris – Jan 23, 2020
   – Paris 2020 – Aperçu – Speakers – Programme – Highlights – Informations
   pratiques – Register
 * QSC24 EMEA

   --------------------------------------------------------------------------------

 * Watch Past Events
 * QSC23 Americas
 * QSC23 Mumbai
 * QSC23 Munich
 * QSC23 London

Register
 * QSC EMEA
 * Speakers
 * Agenda
 * Highlights
 * Venue & Travel
 * Code of Conduct
 * Register. There's no cost


DE-RISK YOUR BUSINESS

With so many disparate tools to measure and manage risk these days, it’s harder
than ever to quantify the impact of cyber risk on your businesses. Join us in
person to find out how today’s security leaders are evolving from enumerating
risk to eliminating it. You’ll hear from industry-leading thought leaders,
Qualys customers, and product experts on the latest strategies and tactics being
used to measure, communicate, and eliminate cyber risk to drive better business
outcomes.


KEYNOTE SPEAKERS

Bio

SUMEDH THAKAR
PRESIDENT AND CEO, QUALYS

Bio

LISA FORTE
PARTNER, RED GOAT CYBER SECURITY


FEATURED SPEAKERS

Bio

SAM EATON
HEAD OF IT SECURITY, AB MAURI

Bio

CHINTAN GURJAR
THREAT AND VULNERABILITY MANAGER, MARKS AND SPENCER

Bio

CLEMENT FOUQUE
VULNERABILITY MANAGEMENT LEAD, ELASTIC

Bio

SHAILESH ATHALYE
SENIOR VICE PRESIDENT, PRODUCT MANAGEMENT, QUALYS

Bio

KEVIN O'KEEFE
SENIOR SECURITY SOLUTIONS ARCHITECT, QUALYS


AGENDA

kick off QSC on the Road on Tuesday, April 16. Meet old friends, make new ones,
enjoy cocktails, and connect with Qualys experts and peers.

TRAINING SESSIONS


 * TRAINING AGENDA
   
   Tue, April 16

CONFERENCE SESSIONS


 * CONFERENCE AGENDA
   
   Wed, April 17

9:00 – 9:45 AM Registration 9:45 – 11:00 AM Operationalize Qualys TruRisk and
Transform Threats Into Opportunities

Join us as we discuss Risk Based Vulnerability Management, and how using threat
intelligence can reduce the vulnerability burden, whilst reducing risk faster.

In this session we will cover how to use Qualys to identify known and unknown
assets, accurately assess those assets and add business context to those assets.
Once we have identified the assets, we will discuss how we add threat
intelligence to help your teams de-risk your business.

11:00 – 11:30 AM Coffee Break 11:30 – 13:00 PM Training Session 1


Qualys Remediationathon

Join us as we look at Qualys Patch Management best practices, and then carry out
a "Remediationathon" with all attendees gaining access to a lab environment to
see who can create the most secure lab. Various prizes will be given out for
those with the most patched/secured assets.

or


Web Application Scanning

Dynamic App Security Testing (DAST) is becoming an ever more important tool in a
developer’s and security professional’s toolkit. Qualys Web Application Scanning
(WAS) has been and continues to be a go-to solution for many security experts
and developers over the years.

This session will help you understand in more detail what the WAS module can
mean for you as a security expert, or as a developer, how it can integrate into
your application development pipelines and what touchpoints exist between Qualys
WAS and the rest of the Qualys ecosystem.



13:00 - 14:00 PM Lunch 14:00 – 14:50 PM Training Session 2

Custom Assessment and Remediation

This 50-minute workshop will teach you how Qualys Custom Assessment and
Remediation (CAR) can help solve unique challenges. You will learn the CAR
workflow and how to implement a script.

or

TotalCloud

Join our training on Qualys TotalCloud to learn how to discover, assess,
prioritize, and remediate vulnerabilities and misconfigurations across a
multi-cloud environment.

14:50 – 15:10 PM Tea Break 15:10 – 16.00 PM Training Session 3

Get Ready for PCI DSS 4.0 with the Qualys Platform

Join us to learn how Qualys File Integrity Monitoring can be deployed to
simplify meeting the new and changing requirements of PCI DSS 4.0.

or

Manage the Risk of Your Supply Chain: Software Composition Analysis, SBOM and
Open-Source Software Security

This session will detail how Qualys Software Composition Analysis can give you
visibility into your software supply chain and mitigate risks associated with
open-source and third-party software components like Log4j and OpenSSL.

16:00 PM Drinks Reception Register

8:30 AM Registration and Coffee 9:10 AM Welcome to QSC EMEA 9:15 - 10:00 AM
External Keynote Lisa Forte, Partner, Red Goat Cyber Security

Lisa Forte's bio

10:00 - 10:50 AM Qualys Keynote Sumedh Thakar, President and CEO, Qualys

Sumedh Thakar's bio

10:50 - 11:15 AM Coffee Break 11:15 - 12:00 PM Qualys Platform Roadmap and
Strategy Shailesh Athalye Senior Vice President, Product Management, Qualys

Shailesh Athalye's bio

12:00 – 12:20 PM Qualys Demo 12:20 – 13:00 PM VMDR, The Journey to Risk
Management and Beyond

Understand why organisations are moving from the traditional VM scanning to a
full lifecycle program to reduce risk. Join the team as we discuss why and how
you make the step change to a proactive risk reduction.

13:00 – 14:00 PM Lunch 14:00 – 14:20 PM Operations Track Remediate
Vulnerabilities and Misconfigurations with Automation and Intelligent Workflows
Clement Fouque, Vulnerability Management Lead, Elastic Management Track
Streamlining Operations with Consolidation and Automation 14:20 – 14:35 PM
Operations Track Remediating the Nightmares: Preparing to Defend Against
Multi-channel Vulnerabilities Management Track Interpreting your TruRisk, Tech
Debt and Attack Surface Reports 14:35 – 15:00 PM Operations Track Changing
Hearts and Minds to Remediate Risk Using Quays Remediation Strategies
Sam Eaton, Head of IT Security, AB Mauri
Kevin O’Keefe, Senior Security Solutions Architect, Qualys Management Track
Adopting a Risk-Based Vulnerability Management (RBVM) program
Chintan Gurjar, Threat & Vulnerability Manager, Marks & Spencer 15:00 – 15:25 PM
Operations Track What have we learned with CSAM and ITSM and how can you all
benefit? Management Track The Power of TruRisk: Building Business Value, Trust
and Industry Benchmarking 15:25 – 15:45 PM Operations Track Practical Measures
for PCI 4.0 Management Track The Power of Prioritisation and Targeting Risk
15:45 - 16:10 PM Tea Break 16:10 – 16:35 PM Measuring and Detecting Cloud Risks
with Artificial Intelligence 16:35 – 17:00 PM Measure, Communicate and Eliminate
using the Power of AI 17:00 – 17:10 PM Closing Remarks 17:10 – 19:00 PM QSC
Reception Register


CONFERENCE HIGHLIGHTS


GO BEYOND ENUMERATING RISK.

Simply calculating the vulnerabilities that cyber risk poses to your business is
no longer enough. See the latest strategies and innovations leading security
experts are implementing to quantify the impact of cyber risk on their
businesses so they can focus on the vulnerabilities that matter most.


GET INSPIRED.

Engage with Qualys’ customer-facing teams and your peers around best practices
and user case studies for applying security automation to real-world challenges.


SHARPEN YOUR EXPERTISE.

One day of free training covers forward-looking strategies, best practices to
improve effectiveness and productivity, and core and expanded product features
to up-level your security program.


WHO SHOULD ATTEND

CIOs, CSOs and CTOs; directors and managers of network, security and cloud;
developers and DevSecOps practitioners; Qualys partners and consultants; or any
forward-thinking security professionals.

Click here to read insights from last year’s QSC EMEA

Register


HILTON PARK LANE
LONDON, UNITED KINGDOM

Qualys Security Conference will be held at the Hilton Park Lane.

Hilton Park Lane
22 Park Ln, London W1K 1BE, United Kingdom
T: +44 20 7836 2400
Hilton Park Lane - London, United Kingdom


CONFERENCE PRICING

Attendance at QSC is complimentary. This includes access to all general
sessions, breakfast, lunch, breaks, and training.

Travel and hotel accommodations are not included with QSC or pre-conference
training.




REGISTER TODAY.

Join us to learn how to effectively secure your hybrid IT environment,
streamline your security and compliance initiatives and enable digital
transformation. There is no cost to attend this event.

Register
 * #qsc2023
 * QSC23 Highlights
 * QSC Blog


LOCATIONS

 * QSC24 Americas
 * QSC24 EMEA
 * QSC23 Americas
 * QSC23 Mumbai
 * QSC23 Munich
 * QSC23 London

 * Phone:
   +1 (650) 801 6100
 * For questions, email us at:
   qsc@qualys.com
 * To subscribe to QSC updates:
   Get Notified


CHINTAN GURJAR


THREAT AND VULNERABILITY MANAGER, MARKS AND SPENCER

Chintan Gurjar is an experienced cybersecurity expert with over 12 years of
dynamic experience. Chintan specializes in various areas, including
vulnerability management, threat intelligence, penetration testing, and attack
surface management. He has worked with a diverse range of clients, from agile
consulting firms to large-scale retail organizations on a global level. Chintan
possesses a wealth of core competencies, including Risk-Based Vulnerability
Management, Penetration Testing & Red Teaming, Attack Surface Management, Threat
Intelligence, and proficiency in Security Operation Center. He has held esteemed
roles such as Threat & Vulnerability Manager at M&S, Global Senior Vulnerability
Management Analyst at TikTok, Security Engineering Manager at Tesco, and
Cybersecurity Manager at KPMG. Chintan’s academic credentials are equally
impressive, with an MSc in Computer Security & Forensics from the University of
Bedfordshire. He also carries numerous industry certifications, including OSCP,
CEH, ACCISO, CTIA, CCFH, CCFA, and SANS MGT516. Apart from being an expert in
his field, he has co-trained at the prestigious HackCon Norwegian cybersecurity
conference. His contributions to the cybersecurity domain have earned him
recognition in multiple Bug-Bounty programs and official CVE entries for
identifying key vulnerabilities.


FELIKS VOSKOBOYNIK


GROUP CHIEF INFORMATION SECURITY OFFICER, A.S. WATSON GROUP

Feliks is currently the Global CISO at AS Watson, the largest health and beauty
retailer. His focus has been to standardize cyber security across the Group and
to ensure that the Group’s business units are cyber resilient. Over the last
several years, he streamlined the Group’s cyber strategy and developed Cyber as
a Group Service (CaaGS). CaaGS is a service, consisting of multiple tools and
processes, provided to the BUs to ensure they are protected against attacks in
our most critical areas like eCommerce, stores and offices. He is also
responsible for the management of the cyber team across Europe and Asia,
developing and maintaining policies, training and standards, setting up our
Security Operations Centre, vulnerability management programmes, XDR
technologies and the roll out the Information Security Standard of Good Practice
Framework across the Group.

Feliks combines over 15 years of privacy/cyber security and IT experience
including roles at Shell and Unilever. Feliks is a visionary leader in the area
of cyber security, who has managed to change the perception and mindsets of
cyber at company levels, whether amongst employees or board members, by bringing
together simple and ‘fit-for-purpose’ cyber security strategies. Feliks also
takes a common sense and pragmatic approach to cyber security, tackling cyber
risk as a business issue and not just an IT issue.


KEVIN KEEFE


SENIOR SECURITY SOLUTIONS ARCHITECT, QUALYS

Kevin O’Keefe is a Senior Security Solutions Architect for EMEA North at Qualys,
a pioneer and leading provider of disruptive cloud-based IT, security and
compliance solutions designed to streamline and consolidate customer’s security
and compliance solutions in a single platform. Kevin has extensive experience in
the cybersecurity industry, having worked in two FTSE 100 organisations
delivering critical Cyber security projects. Kevin joined Qualys in 2019, after
successfully deploying a worldwide vulnerability management and remediation
program, and has since worked with Qualys’ largest customers to improve theirs.


SUMEDH THAKAR


PRESIDENT AND CEO, QUALYS

As President and CEO, Sumedh leads the company’s vision, strategic direction and
implementation. He joined Qualys in 2003 in engineering and grew within the
company, taking various leadership roles focused on helping Qualys deliver on
its platform vision. From 2014 to 2021, he served as Qualys’ Chief Product
Officer, where he oversaw all things product, including engineering,
development, product management, cloud operations, DevOps, and customer support.
A product fanatic and engineer at heart, he is a driving force behind expanding
the platform from Vulnerability Management into broader areas of security and
compliance, helping customers consolidate their security stack. This includes
the rollout of the game-changing VMDR (Vulnerability Management, Detection and
Response) that continually detects and prevents risk to their systems,
Multi-Vector EDR, which focuses on protecting endpoints as well as Container
Security, Compliance and Web Application Security solutions. Sumedh was also
instrumental in the build-up of multiple Qualys sites resulting in a global 24x7
follow-the-sun product team.

Sumedh is a long-time proponent of SaaS and cloud computing. He previously
worked at Intacct, a cloud-based financial and accounting software provider. He
also worked at Northwest Airlines developing complex algorithms for its yield
and revenue management reservation system. Sumedh has a bachelor’s degree in
computer engineering with distinction from the University of Pune.


CLEMENT FOUQUE


VULNERABILITY MANAGEMENT LEAD, ELASTIC

Clement Fouque is a Principal Information Security Analyst at Elastic, where he
leads the vulnerability management program within the InfoSec department.

Before joining Elastic, Clément worked as a Microsoft SharePoint Consultant in a
consulting company and then at Richemont, the second biggest luxury company in
the world. He internally moved to the InfoSec department and worked as an
incident response analyst and a red team coordinator.


SHAILESH ATHALYE


SENIOR VICE PRESIDENT, PRODUCT MANAGEMENT, QUALYS INC.

As Senior Vice President of Product Management, Shailesh leads the product
management team and drives the Qualys product vision helping customers assess
and improve their IT, security and compliance posture. Since joining Qualys in
2012, he has worked in various security and compliance roles driving innovative
solutions, including remote endpoint protection, endpoint detection and
response, and SaaS security. In addition, Shailesh headed engineering, research
and product management for Qualys Policy Compliance and File Integrity
Monitoring, where he helped customers go beyond compliance to drive their IT GRC
objectives. Before Qualys, he focused on security research for Symantec ESM and
Compliance solutions. Shailesh holds a master’s in computer applications (MCA)
from the Vishwakarma Institute of Technology and has various security
certifications including CISA, CRISC, CISM. He is also a regular speaker at
industry conferences.


SAM EATON


HEAD OF IT SECURITY, AB MAURI

I am currently Head of IT Security at AB Mauri, a global yeast & bakery
ingredients organisation with businesses spanning across 32 countries. My role
encompasses the creation, maintenance, and delivery of our global cyber security
strategy.

Having held various IT roles in my career, in 2018, I embarked on my journey in
cyber security. Since then, I have not only enjoyed the challenges and rewards
this field offers but also had the privilege of collaborating with an
exceptional and supportive community of professionals.

I am looking forward to sharing my experiences and insights at this conference.


LISA FORTE


PARTNER, RED GOAT CYBER SECURITY

Lisa Forte is a highly respected Cyber Security Expert with an impressive
background in the field. Her career began with her work to combat piracy off the
coast of Somalia, followed by a role in UK Counter Terrorism Intelligence, and
eventually moving on to one of the UK Police Cyber Crime Units. In 2017, she
co-founded Red Goat Cyber Security and has since become one of the most
prominent voices in the industry. Lisa is an internationally recognised speaker,
named as one of the Top 100 Women in Tech, who is renowned for her expertise in
cyber crisis management, ransomware, risk management, insider threats, and
social engineering. Her extensive knowledge has helped large companies improve
their incident response plans and rehearse for potential cyber-attacks. She has
also appeared in documentaries and on BBC’s Newsnight, and is a regular
contributor to national news, radio, and newspapers. As a speaker, Lisa is known
for her energetic presentations that draw on storytelling and real-life
experiences. She has a passion for the “tech for good” philosophy and co-founded
the Cyber Volunteers 19 movement in 2020 to help protect hospitals from
cyber-attacks during the pandemic. She also co-founded Respect In Security,
which aims to combat hate and harassment in the industry. Lisa’s presentations
are not limited to cyber security, however. As an experienced climber,
mountaineer, and caver, she is able to offer unique perspectives on risk
management and motivation. Her dynamic and engaging approach, coupled with her
personal experiences and research, make her a highly sought-after keynote
speaker, panel chair, and conference chair. Lisa Forte is also an experienced
cyber security trainer, capable of effectively communicating her message to all
types of audiences.

Notice. We use cookies to optimize our website. By continuing to use our site,
you accept our privacy policy.

Yes, I accept Cookies No thanks