REDWOOD CITY, CA -- (Marketwire) -- 02/19/13 -- Qualys Inc. (NASDAQ: QLYS), a leading provider of cloud security and compliance solutions, today announced that its Chairman and CEO Philippe Courtot will examine the evolution of security in a hyperconnected world in his keynote at RSA Conference USA 2013. Courtot's keynote, which will also feature John Pescatore, director of the SANS institute, will reveal research on the state of cyber threats caused by intelligent devices and outline the fundamental changes required to secure this new era. In addition to the keynote session, company executives and researchers will present new research on current threats and industry trends on a wide range of information security topics, including browser security, the use of WebSockets in HTML5 and vulnerability management for IPv6 and SCADA.
During RSA Conference USA 2013, taking place February 25 - March 1 in San Francisco, Qualys executives and researchers will present:
The Hyperconnected World of Intelligent Devices: A New Era for Security (Keynote)
Wednesday, February 27 at 2:50 p.m. PT
Philippe Courtot, chairman and CEO, Qualys; John Pescatore, director, SANS Institute
This keynote session will examine the disruptions that intelligent devices are having on the current security model and the fundamental changes required to secure this new era.
Are the 20 Critical Controls a New Standard of Due Care for Cybersecurity? (END-T17)
Tuesday, February 26 at 1:10 p.m. PT
Wolfgang Kandek, CTO, Qualys; Ed Skoudis, CEO, Counterhack; Alan Paller, director of research, SANS Institute; Jonathan Trull, CISO, state of Colorado
This session will cover the 20 Critical Controls - the value they provide in stopping attacks, how they will evolve and how to implement them as part of your defensive strategy.
Automating the 20 Critical Controls (SPO1-T19)
Tuesday, February 26 at 3:50 p.m. PT
Andrew Wild, CSO, Qualys; Wolfgang Kandek, CTO, Qualys
The CSIS 20 critical controls are known for driving effective security programs across government agencies and establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This session will discuss best practices for automation of these controls to drastically lower costs while enabling more successful implementations.
Most Popular Stories
- SEO Traffic Lab Celebrate Wins at Digital Marketing Event 'Internet World 2013' in London
- Social Media Initiatives Should Follow Customers' Lead
- Apple CEO: Offshore Units Not a 'Tax Gimmick'
- U.S. Senate Accuses Apple of Large-scale Tax Avoidance
- UTEP Water Recycling Project Wins Venture Titles
- Marketo Makes a Mint in IPO: Stock Shoots Up More than 50 Percent
- Bieber Booed at Billboard Awards
- Crude Oil Up, Gasoline Down
- Austin Startup Compare Metrics Raises $3.5 Million for Expansion
- Why So Many Top 'Car Guys' Are Actually Women