Vulnerability management - beyond scanning Vulnerability Management @ DevSecOps London Gathering C-Level tools for Cloud security Secure your cloud applications by building solid foundations with enterprise (security) architecture Cloud security and security architecture 2012 10 cloud security architecture Mobile phone as Trusted identity assistant Security architecture for LSE 2009 Mobile security summit - 10 mobile risks Integrating Qualys into the patch and vulnerability management processes Securing mobile population for White Hats Security models for security architecture Meaningfull security metrics CAMM presentation for Cyber Security Gas and Oil june 2011 ISE UK&Ireland 2008 Showcase Nominee Presentation Vladimir Jirasek