Qualys Technical Series – The Ins and Outs of Security Configuration Assessment

Logo
Presented by

Francesco Armando, Technical Account Manager at Qualys

About this talk

Vulnerability assessment alone is not enough to protect systems from compromise as misconfigurations are a major source of breaches. Weak or improper continuous security configuration assessment (SCA) settings are often exploited by hackers and have played a significant role in high-profile cyberattacks like Petya. Join this Technical Series webinar and learn from a Qualys Technical Account Manager why Security Configuration Assessment should not be ignored. This session covers: - Introduction to SCA - A brief enumeration of the differences with the Policy Compliance apps - A digress about the Center for Internet Security (CIS) - Quick start guide
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (168)
Subscribers (82256)
Join us for this informative technology series for insights into emerging security trends that every IT professional should know. These brief sessions will give you an opportunity to discover best practices from market leaders as well as hands-on advice from industry experts on a variety of security and compliance topics. Let Qualys help keep you up-to-date with cost-effective and efficient technology trends. Choose the topic that interests you or plan to attend the entire series to make sure you stay ahead of the curve.