Rethinking Asset Management to Improve Enterprise Security

One common reason behind many enterprise security breaches is that attackers found a system, application, or device that security teams didn’t know they had. Attackers can tamper with these unknown systems to make them look legitimate, and security defenders may not be able to tell the difference. You can’t protect what you don’t know about, and it is hard to tell if you have any “blind spots.” In this webinar, experts discuss technologies and strategies for mapping out a complete picture of the enterprise IT environment and identifying rogue components. You will learn how to identify and secure unknown elements while eliminating those that can cause harm.

On Demand
1h 00min

Attend this webinar and you'll:

  • Gain new tips and techniques for discovering unregistered and potentially dangerous endpoint devices.
  • Be better equipped to assess whether a system or application is benign or harmful.
  • Learn more about emerging attacks that exploit assets that fly under the radar
  • Find new ways to prevent and protect IT assets all across the enterprise network, including the cloud.

Featured Speakers

  • Brad Causey
    Brad Causey
    Vice President of Offensive Security

    Brad Causey is an active member of the security and forensics community worldwide. Brad tends to focus his time on Web Application security as it applies to global and enterprise arenas. He is a member of the OWASP Global Projects Committee and the President of the International Information Systems Forensics Association chapter in Alabama. Brad is an avid author and writer with hundreds of publications and several books. Brad also holds dozens of industry recognized certificates such as CISSP, MCSE, C|EH, CIFI, and CGSP.

  • Shailesh Athalye
    Shailesh Athalye
    Senior Vice President, Product Management

    As Senior Vice President of Product Management, Shailesh leads the product management team and drives the Qualys product vision helping customers assess and improve their IT, security and compliance posture. Since joining Qualys in 2012, he has worked in various security and compliance roles driving innovative solutions, including remote endpoint protection, endpoint detection and response, and SaaS security. In addition, Shailesh headed engineering, research and product management for Qualys Policy Compliance and File Integrity Monitoring, where he helped customers go beyond compliance to drive their IT GRC objectives. Before Qualys, he focused on security research for Symantec ESM and Compliance solutions. Shailesh holds a master’s degree in computer applications (MCA) from the Vishwakarma Institute of Technology and has various security certifications including CISA, CRISC, CISM. He is also a regular speaker at industry conferences.

  • Terry Sweeney
    Terry Sweeney
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World,, and Stadium Tech Report.

Sponsored By