REDWOOD CITY, CA -- (Marketwire) -- 02/19/13 -- Qualys Inc. (NASDAQ: QLYS), a leading provider of cloud security and compliance solutions, today announced that its Chairman and CEO Philippe Courtot will examine the evolution of security in a hyperconnected world in his keynote at RSA Conference USA 2013. Courtot's keynote, which will also feature John Pescatore, director of the SANS institute, will reveal research on the state of cyber threats caused by intelligent devices and outline the fundamental changes required to secure this new era. In addition to the keynote session, company executives and researchers will present new research on current threats and industry trends on a wide range of information security topics, including browser security, the use of WebSockets in HTML5 and vulnerability management for IPv6 and SCADA.
During RSA Conference USA 2013, taking place February 25 - March 1 in San Francisco, Qualys executives and researchers will present:
The Hyperconnected World of Intelligent Devices: A New Era for Security (Keynote)
Wednesday, February 27 at 2:50 p.m. PT
Philippe Courtot, chairman and CEO, Qualys; John Pescatore, director, SANS Institute
This keynote session will examine the disruptions that intelligent devices are having on the current security model and the fundamental changes required to secure this new era.
Are the 20 Critical Controls a New Standard of Due Care for Cybersecurity? (END-T17)
Tuesday, February 26 at 1:10 p.m. PT
Wolfgang Kandek, CTO, Qualys; Ed Skoudis, CEO, Counterhack; Alan Paller, director of research, SANS Institute; Jonathan Trull, CISO, state of Colorado
This session will cover the 20 Critical Controls - the value they provide in stopping attacks, how they will evolve and how to implement them as part of your defensive strategy.
Automating the 20 Critical Controls (SPO1-T19)
Tuesday, February 26 at 3:50 p.m. PT
Andrew Wild, CSO, Qualys; Wolfgang Kandek, CTO, Qualys
The CSIS 20 critical controls are known for driving effective security programs across government agencies and establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This session will discuss best practices for automation of these controls to drastically lower costs while enabling more successful implementations.
Most Popular Stories
- AIG to Create 230 Jobs in Charlotte
- 15 Myths That Could Ruin Your Hispanic Ad Campaign
- Russia Says Nyet to Canada North Pole Claim
- General Motors Names Mary Barra as First Female CEO
- Bipartisan Negotiators Reach Modest Budget Agreement
- Justin Bieber Visits Typhoon Victims, Plays Concert
- Senate Dems Move Forward With Obama Nominees
- New Obama Aide to Focus on Climate Change
- Obama Nominee Confirmed for D.C. Appeals Court
- MasterCard to Split Shares, Raise Dividend