TLS Decryption: Critical to Detecting Threats

Logo
Presented by

Lindsay Drabwell, Head of Membership, (ISC)² EMEA, Ollie Sheridan, Principal Engineer, Gigamon

About this talk

As the volume of encrypted traffic continues to grow, organisations become even more vulnerable to encrypted attacks, threats and exploits that go undetected. Learn how to create a centralised “decryption zone” to decrypt traffic once and give security tools newfound visibility into encrypted traffic. Join Ollie Sheridan (CISSP), Principal Engineer at Gigamon to learn: •How the TLS 1.3 draft 28 proposal removes visibility which was widely deployed for threat identification in TLS 1.2. •How to acknowledge and address critical management, troubleshooting, legal, regulatory, ethical and technical concerns. •Why deploying TLS decryption in the core of networks is critical to detecting threats. •How to deploy innovative architectures for TLS decryption while maintaining availability and reliability. •How to manage growing SSL/TLS traffic volumes by creating a centralized “decryption zone” to decrypt traffic once and give security tools newfound visibility into formerly encrypted traffic and threats.

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (386)
Subscribers (88915)
ISC2 Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs