Hi [[ session.user.profile.firstName ]]

Encrypted Things – Finding Threats in an Obscure World

With the release of TLS 1.3 and the continued rise of external and internal encrypted traffic use, security teams are faced with the dilemma of finding threats within traffic streams that are increasingly obscured. Though many organizations decrypt and inspect traffic due to both security and regulatory concerns, there are many that are effectively blind to threats that are communicating via encrypted channels. However, the news is not all grim; join (ISC)² and Gigamon as we dive into discovery methodologies that can be used to detect threats within encrypted traffic without the need for decryption.

You’ll learn:
- Threat detection methodologies
- Encryption-agnostic detection techniques
- Detailed breakdown of what encrypted traffic can reveal
- Best practices
Recorded Nov 3 2020 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ricardo Font – Product Marketing Manager, Gigamon
Presentation preview: Encrypted Things – Finding Threats in an Obscure World
  • Channel
  • Channel profile
  • Securing the Hybrid Cloud: 5G Networks Jul 27 2021 5:00 pm UTC 1 min
    Gordon Beith, Senior Director, Product Marketing — Gigamon
    5G networks, almost by definition, are hybrid cloud networks. Any company adopting 5G is in effect adopting a hybrid cloud model. As mobile network service providers launch their 5G services around the world starting with radio access network (RAN) deployment followed by the core network, security vulnerabilities, including preventing or mitigating their effects, are top of mind. Whether the network functions and services are physical, virtual on-prem, or public cloud, ensuring comprehensive continuous visibility into the network is crucial to ensuring and maintaining adequate security. Join Gigamon and (ISC)2 on April 9, 2021 at 1:00PM Eastern for a discussion on understanding how coherent, high-fidelity network data can enable a strong security posture without breaking the bank.
  • Securing the Hybrid Cloud: Optimizing SIEM Jul 20 2021 5:00 pm UTC 59 mins
    Muhammad Durrani, Technical Marketing Engineer — Gigamon
    SIEM systems are pivotal to IT organization’s security operations. Many companies are adopting a hybrid cloud model, and cloud-based SIEMs are becoming common as a result. Regardless of on-prem or cloud deployments, the challenges around SIEM remain the same, from data overload, lack of contextual information, to high costs. Security best practices in deploying SIEMs also remain unchanged, which include establishment of use cases, data ingestion types and development of parsers for various tool vendors. On March 9, 2021 at 1:00pm Eastern, Gigamon and (ISC)2 will present a webinar that will cover solutions to these challenges such as Gigamon’s Application Metadata Intelligence as well as various smart filtering techniques.
  • Avoiding or Minimizing Ransomware Impact to the Bottom Line Jul 14 2021 5:00 pm UTC 61 mins
    John Pescatore, Director of Emerging Security Trends + Benjamin Wright, Lawyer, Technology Law
    In the event of a ransomware attack, security managers must be able to give business-relevant risk recommendations to CEOs and boards of directors. Most of the thought and effort required to do so must take place well before the attack.

    On this webcast, John Pescatore, SANS Director of Emerging Security Trends, and Benjamin Wright, lawyer and SANS Senior Instructor, will discuss key ransomware issues, including:
    - Key security processes to avoid ransomware attacks
    - Issues around ransomware payoffs if an attack succeeds
    - How cyber insurance can play a role in reducing the financial impact of an attack
  • Securing the Hybrid Cloud: Visibility Best Practices Jul 13 2021 5:00 pm UTC 62 mins
    James Mandelbaum, Field CTO & Senior Security Engineer — Gigamon
    With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Visibility is critical. Join our session for a discussion of the security considerations for on-prem private, public and hybrid clouds. You’ll learn best practices and see how a little planning and design can go a long way. Achieve a secure and viable hybrid cloud implementation and get a high return on your investment.
  • SANS 2021 Report: Top Skills Analysts Need to Master Jul 7 2021 5:00 pm UTC 60 mins
    Ismael Valenzuela, co-author of the cyber defense course SANS SEC530: Defensible Security Architecture and Engineering
    The U.S. Bureau of Labor Statistics reports that the employment of information security analysts is projected to grow 32% from 2018 to 2028, much faster than the average for all occupations. As one of the highest-paid jobs in the field, security analysts must become masters of all trades, becoming “all-around defenders,” highly competent in threat detection, while maintaining excellent analytical and communication skills. But what are the technical and nontechnical skills required to acquire mastery in this role? And how can industry security solutions augment analysts’ capabilities to become more effective?

    In this webcast, SANS author, instructor, and analyst Ismael Valenzuela will answer these questions and discuss the top skills that security analysts need.
  • Shifting IT Strategies to a Cloud-based Infrastructure Jun 30 2021 5:00 pm UTC 61 mins
    Dave Shackleford, SANS analyst + Bassam Khan, VP of Product and Technical Marketing, Gigamon
    This SANS survey explored the types of services organizations are using, what types of controls and tools provide the most value, and how effective cloud security brokering is for a range of use cases. in this webcast, SANS analyst Dave Shackleford will join sponsor speakers to explore how survey results can inform and improve your cloud security posture.
  • See Inside Containers with the Gigamon Cloud Suite Jun 29 2021 5:00 pm UTC 30 mins
    Baseer Balazadeh, Senior Technical Marketing Engineer - Cloud, Gigamon
    Container solutions continue to transform application environments and expand their reach in the network. IT teams are asked to be flexible and adaptable as the enterprise adopts new complexities, but also need to remain cautious about the security implications for the network. This replay of an ActualTech Media Ecocast is a must-see for anyone managing ad hoc, complex security deployments with containers. Learn how the Gigamon Cloud Suite helps you achieve visibility into all traffic across your hybrid cloud.
  • Healthcare’s Cybersecurity Solution Market - Where it’s Now Headed and Why? Jun 22 2021 5:00 pm UTC 47 mins
    Thomas Finn, Dir Biz Dev, Medigate + Martyn Crew, Sr Dir Industry Mktg, Gigamon + Sean Tufts, Dir, Product Security, Optiv
    For a solution market just 3 years in the making, most everything we thought we knew about IoT cybersecurity has changed. Sales pitches once centered on threats, quickly gave way to features, functions, speeds and feeds, and now the conversations are about interoperability, operational efficiency and business value.

    Front-line experts from Gigamon, Optiv and Medigate will shed light on IoT cybersecurity’s rapid coming of age, and will discuss where the IoT solution market is clearly headed. Importantly, webinar attendees will learn about emerging best practices and how they are shaping an enlightened new concept called “Clinical Zero Trust.”
  • Securing the Hybrid Cloud: Visibility Best Practices Recorded: Jun 15 2021 59 mins
    James Mandelbaum, Field CTO & Senior Security Engineer — Gigamon
    With the move to cloud and the multitude of approaches, your ability to effectively monitor and secure workloads gets even more difficult. IT complexity, the rate of change, lack of skills, and organizational silos have made confidently managing security and performance nearly impossible. Visibility is critical. Join our session for a discussion of the security considerations for on-prem private, public and hybrid clouds. You’ll learn best practices and see how a little planning and design can go a long way. Achieve a secure and viable hybrid cloud implementation and get a high return on your investment.
  • Sharpening Your Focus: Effective Pivots From ThreatINSIGHT Observations Recorded: Jun 15 2021 56 mins
    Gigamon Technical Success Team
    Expanding on using Gigamon ThreatINSIGHT™ observations to kickstart your investigation and hunting efforts, this session provides a refresher on using observations and demonstrates how to effectively pivot from ThreatINSIGHT observations to discover anomalies and potentially malicious behavior in your environment.
  • Ransomware Loitering Presents an Opportunity for Network Detection Recorded: Jun 8 2021 29 mins
    Bassam Khan, VP of Product and Technical Marketing at Gigamon
    The recent surge of ransomware attacks has shown a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged and targeted approach. While this shift presents threat groups with the opportunity to encrypt more critical data, it also presents security teams with the opportunity to detect activity before data is encrypted.

    Join this webinar to explore how ransomware loitering allows security analysts to use network detection and response capabilities to discover malicious activity between initial compromise and encryption.
  • 2021 Cyberthreat Defense Report Recorded: Jun 2 2021 55 mins
    Steve Piper – Founder and CEO, CyberEdge Group + Martyn Crew – Sr Dir Industry Solutions, Gigamon
    Hear the latest research and findings from the CyberEdge 2021 Cyberthreat Defense Report and use them to benchmark your organization’s security posture, operating budget, product investments and best practices against those of your peers in this video webinar.

    The Cyberthreat Defense Report is the de facto standard for assessing security posture. It offers key insights from IT security professionals, helping you to ascertain future IT security infrastructure investments.

    Now in its eighth year, the report incorporates perspectives from 1,200 IT professionals across 19 industries and 17 countries. Join the webinar to hear from Steve Piper, CISSP, Founder and CEO of CyberEdge Group as he reviews the most important findings from the research. Watch to the end to hear Martyn Crew, Director Industry Solutions at Gigamon ask Steve for his insight and perspectives on cyberthreat defense.
  • Report: NetOps and SecOps Guide to Public Cloud Journeys Recorded: Jun 1 2021 57 mins
    Rich Mogull – Analyst & CEO, Securosis
    Enterprises are moving to the cloud faster and furiouser than ever before. As with any complex project, it’s all too easy to get caught up in the tech of the day and lose sight of the journey. In this strategic session for network operations and security professionals, industry analyst Rich Mogull will pull together over a decade’s experience to identify the top opportunities and avoid the top mistakes when moving to the cloud.

    This session includes:
    • An overview of cloud adoption patterns
    • The characteristics of the patterns, and the top opportunities and mistakes
    • How to leverage the concept of the “Minimum Viable Network” to dramatically improve your lift-and-shift and hybrid cloud deployments
  • Upleveling Your Security and Networking Capabilities Recorded: May 25 2021 27 mins
    Stephen Newman, Vice President, ThreatINSIGHT Product Marketing at Gigamon
    We all see data breaches highlighted on the evening news, but that's NOT the kind of notoriety your company needs! Every organization has concerns about data and network security, but what steps should you take to protect yourself?

    In this webinar, you'll hear about:
    •Critical components of network detection and response (NDR) technologies
    •Why visibility is a cornerstone to any NDR technology
    •How Gigamon ThreatINSIGHT™ gives you visibility into all devices and traffic types
  • The Tools that Supercharge a VMware Environment Recorded: May 18 2021 28 mins
    James Mandelbaum, Senior Security Engineer at Gigamon
    Virtualization remains at the forefront of the data center, and is extending into the cloud to enable true hybrid and multi-cloud environments. These environments aren't an island and demand an ecosystem of solutions to perform at the level demanded by a company's applications.

    To ensure those applications perform well and are highly available across the company, smart companies are leveraging innovative new technology, efficiently integrated into their VMware infrastructure.
  • Eliminating the WFH Security Visibility Gap: Gigamon ThreatINSIGHT and Zscaler Recorded: May 18 2021 50 mins
    Rahim Ibrahim, Zscaler Business Development & Tech Alliances Mgr + Stephen Newman, VP, Gigamon Product Marketing
    As temporary workplace policies move mainstream, Enterprise security teams are constantly looking for tools and best practices to gain visibility into their network traffic. In this webinar, we'll highlight the visibility benefits that our Enterprise customers are receiving as they have supported and implemented various new work from home policies.

    You'll learn about:
    • Security Trends from 2020-2021
    • The ease of deployment and management from industry-leading SaaS-based services
    • How customers use the Gigamon ThreatINSIGHT and Zscaler integration to get better visibility
  • 2020 SANS Enterprise Cloud Incident Response Survey Results Recorded: May 11 2021 57 mins
    SANS Survey Author, Chris Dale & Survey Advisor, Matt Bromiley + Expert Panel
    In this webcast, survey author Chris Dale and survey advisor Matt Bromiley will join experts representing the survey sponsors to discuss results from the 2020 SANS Enterprise Cloud Incident Response Survey. This roundtable will also explore best practices for detecting, responding to and remediating incidents in the multi-cloud world.

    Attendees at this webcast will learn about the experiences of survey participants with regard to:
    o What components are being breached
    o Preferred sources of evidence in concluding cloud compromise
    o Most prevalent cloud detection capabilities
    o Containment strategies used to control and limit damages from compromise
    o Ways forward in terms of commitment, improvement and impediments
  • CYSEM-21: Cyber Security and Monitoring for the year 2021 Recorded: May 4 2021 37 mins
    George Smith, Senior System Engineer at Gigamon
    Cyber Security and Monitoring for the year 2021, is all about acknowledging that we are in a pandemic of cyberattacks in a world of the ever-increasing attack surface with no one single technological vaccine.

    In this Secure World session replay, we will discuss practical, real-world approaches to providing continuous visibility in your complex attack surface, allowing you to combat the threat landscape, therefore, increasing your confidence in your security posture.
  • Responding to the Pandemic: Information Security and Technology Trends Recorded: Apr 27 2021 28 mins
    Christopher Steffen, Research Director at EMA and CISSP, CISA
    The COVID-19 pandemic has transformed nearly every aspect of life: the ways people shop, eat, and conduct business. With these changes come new challenges for business leaders trying to keep their businesses afloat. Business leaders and the vendors that support them are trying to understand how the changes will impact their enterprises.

    Leading IT research firm Enterprise Management Associates (EMA) recently completed research into the impacts that the pandemic will have on information security:
    - How business approach and prioritize security
    - Trends in spending and technologies
    - How vendors are adjusting their offerings to handle these evolving markets and threats

    Join Christopher Steffen, research director at EMA and CISSP, CISA, as he reviews the results of this research report: “Best Practices for the Enterprise: Information Security and Technology Trends Responding to the Pandemic.”
  • Guide to Your Public Cloud Journey: 10 Mistakes to Avoid Recorded: Apr 15 2021 46 mins
    Rich Mogull – Analyst & CEO, Securosis
    Enterprises are moving to the cloud faster and furiouser than ever before. As with any complex project, it’s all too easy to get caught up in the tech of the day and lose sight of the journey. In this strategic session for network operations and security professionals, industry analyst Rich Mogull will pull together over a decade’s experience to identify the top opportunities and avoid the top mistakes when moving to the cloud.

    This session includes:
    • An overview of cloud adoption patterns
    • The characteristics of the patterns, and the top opportunities and mistakes
    • How to leverage the concept of the “Minimum Viable Network” to dramatically improve your lift-and-shift and hybrid cloud deployments
Visibility into physical, virtual, and cloud environments
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Encrypted Things – Finding Threats in an Obscure World
  • Live at: Nov 3 2020 6:00 pm
  • Presented by: Ricardo Font – Product Marketing Manager, Gigamon
  • From:
Your email has been sent.
or close