Coffee Talk: The Case (and Caveats) for Cloud-Based Patch Management

Date: Thursday, June 6th at 11am PT / 2pm ET

Join us live to qualify to receive a $5 Starbucks gift card!*

Vulnerability management has radically transformed and if it was a challenge when all we had was on premise servers exposed to the internet, it’s become an absolute nightmare with the migration of servers and services to the cloud. Ian Thornton-Trump CD, CISO of Cyjax has war stories; of development and test environments abandoned, data that should have been deleted post divestment and how the lack of Sub-resource Integrity (SRI) and Content Security Policy (CSP) on webservers netted paydays in the millions for “cloud jackers”. If software development can innovate and benefit from the injection of security & threat models into the Continuous Integration Continuous Development (CIDC) pipelines, then IT and Security Operations must do so as well. The cloud is a different animal. Wonderfully agile and flexible but, with great capabilities comes complexity at a level few can fathom.

Kick back on this Coffee Talk and listen to Ian radically transform your approach to endpoint and cloud vulnerability management - you can’t even imagine what you may discover in your own organization, which requires management and security.

Here is the AGENDA for the Coffee Talk:

11:00 a.m. PT / 2:00 p.m. ET
The Case (and Caveats) for Cloud-Based Patch Management

11:30 a.m. PT / 2:30 p.m. ET
Quest: The KACE (and Caveats) for Cloud-Based Patch Management

Register now!

Our Industry Expert:

Ian Thornton-Trump, CISO, Cyjax

Ian Thornton-Trump is the chief information security officer at Cyjax and the CTO of Octopi Managed Services. His 25-year career includes service in the Intelligence branch of the Canadian Armed Forces, the Canadian Forces Military Police Reserves, and the RCMP. He's been a cyber-security consultant for both multi-national and regional organizations, and today, as a virtual CISO, he helps both large and small companies build security operations and cyber-threat intelligence programs.

Moderated by:
John K. Waters, Editor at Large,

Our Featured Presenter:

Kent Feid, Senior Director of Product Management, Quest

*Prize will be distributed to the first 200 attendees who attend the live event for a minimum of 51% of the total presentation. Only valid business e-mail addresses of current employer will be considered. Only eligible for one entry per individual, not per e-mail address. Must be a US resident. No substitutions allowed. False and/or deceptive entries or acts shall render entrants ineligible. No purchase is required. This offer is not valid where prohibited by law. If there is any reason to suspect abuse, fraud, or breach of these terms and conditions, we have the right to void the prize.

Duration: 1 hour

Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.