Key Learning Points
- Define what ‘Continuous Security’ means
- Discuss the key trends driving the need for continuous security
- Offer best practices for building a continuous security program
Level: Intermediate
Hackers probe your perimeter constantly, using automated tools to exploit the vulnerabilities they find. Yet enterprises, burdened with inflexible systems, outdated processes and limited resources, are forced to treat perimeter security as a monthly or quarterly project. This session will lay out a blueprint for creating a continuous security practice spanning the entire lifecycle, from discovering assets to prioritizing issues and mitigating exploits. In addition, Lino will discuss how taking a continuous approach to perpetually audit your perimeter, can help baseline your environment, set appropriate rules, receive exception-based alerts and act quickly.
About Lino Lopez-Luna
Lino Lopez-Luna is the vulnerability management subject matter expert for Qualys. With more than 10 years of experience within the information security market, Lino has a strong security architect background and has held various roles including research and development and security auditor. Prior to joining Qualys, he was at Ernst & Young, where he was the lead information security architect overseeing the company’s vulnerability management program. Passionate for the field of “attack surfaces,” Lino is CISA, CGEIT and CRISC certified.
Follow Lino on Twitter