Available On Demand
Length: 1 Hour
To combat the growing risk of cyber attack, organizations must close the time-to-remediation gap. Doing this requires an integrated approach to vulnerability management which begins with taking inventory of every system on the hybrid IT network. Then, organizations must evaluate these systems for vulnerabilities and analyze the results to prioritize remediation efforts. Finally, to close the time-to-remediation gap, organizations must take action as quickly as possible, applying patches, making configuration changes, etc. in response.
In this informative 60-minute webinar, security experts Bill Kleyman and Prateek Bhajanka will teach you:
- How vulnerability management, detection and response (VMDR) systems work.
- Why vulnerability management is not a numbers game but game theory.
- How cyber crime became an industry and what it means for you.
- How to create an architecture that's both a sensor and enforcer around advanced security policies and risk mitigation.
Register Now!
If you have already registered, click here to access
Speakers:
Bill Kleyman, Contributing Editor, ITPro Today
Bill Kleyman is Executive Vice President of Digital Solutions at Switch. Using AI, machine learning, data center design, DevOps and cloud, Mr. Kleyman delivers innovative solutions that help customers excel in a competitive marketplace. As a technology thought leader, Bill was ranked #16 globally in an Onalytica study of the top 100 most influential individuals in the cloud landscape, and #4 in an Onalytica study of the top data security experts.
Prateek Bhajanka, VP of Product Management, Qualys
Prateek Bhajanka (CISA, CEH) is VP of Product Management at Qualys, where he's responsible for product definition, roadmap, marketing and strategy for the VMDR product. He has comprehensive experience in vulnerability management, application security and endpoint security. Prior to joining Qualys, Prateek was a security analyst with Gartner and a cybersecurity consultant with Deloitte. He holds M.B.A. in information security management and a Bachelor of Engineering.
Brought to you by: