Cloud Platform
Contact us
Asset Management
Vulnerability & Configuration Management
Risk Remediation
Threat Detection & Response
  • Overview
  • Platform Apps

  • Qualys Endpoint Security

    Advanced endpoint threat protection, improved threat context, and alert prioritization

  • Context XDR

    Extend detection and response beyond the endpoint to the enterprise

Compliance
Cloud Security

Complimentary Webcast

Automating CIS Critical Security Controls for Threat Remediation and Enhanced Compliance

Recorded


Speakers

  • John Pescatore, Director of Emerging Security Trends, SANS
  • Tim White, Director of Product Management for Policy Compliance, Qualys

Trends like the increased use of cloud computing by businesses and their vendors introduce new complexities in reducing risk and assessing security across the supply chain. Demonstrating continuous risk reduction and compliance with internal policies and external regulations, fixing violations and configuration drift, centrally managing exceptions, and documenting progress are all common challenges.

The Center for Internet Security’s (CIS) Critical Security Controls (CSCs) were selected and prioritized by leading security experts to stop today’s most common and serious cyber threats. By implementing these controls, organizations can improve their security posture and reduce the risk of threats to critical assets, data, and network infrastructure.

In this webcast SANS Senior Analyst John Pescatore and Tim White, Director of Product Management for Qualys Policy Compliance (PC), will discuss how you can achieve continuous security and compliance, and leverage Qualys solutions to address all 20 CSCs.

This webcast includes a demo and Q&A session with the speakers.

The presentation will encompass:

  • An overview of the CIS Critical Security Controls, including ongoing updates
  • Success patterns organizations have demonstrated for using the controls to their advantage
  • How an automation can reduce the staffing load to determine whether controls are in place and effective
  • How to prioritize remediation efforts
  • Real-world examples of recent attacks that leveraged misconfigured systems

Watch On Demand

Speakers’ Bios

John Pescatore

John Pescatore joined SANS as director of emerging security trends in January 2013 after more than 13 years as lead security analyst for Gartner, 11 years with GTE, and service with both the National Security Agency, where he designed secure voice systems, and the U.S. Secret Service, where he developed secure communications and voice systems "and the occasional ballistic armor installation." John has testified before Congress about cyber security, was named one of the 15 most-influential people in security in 2008 and remains an NSA-certified cryptologic engineer.

John Pescatore

Director of Emerging Security Trends, SANS

Tim White

Tim White is Qualys’ director of product management for policy compliance. With more than 20 years of experience in IT GRC, he has worked with a variety of large enterprises across many different verticals while shaping products in the industry. He also has significant experience in broader Information Security, working with products ranging from Firewalls, Network Security, and Host Security.

Tim White

Director of Product Management for Policy Compliance, Qualys