Encrypted Things – Finding Threats in an Obscure World

Logo
Presented by

Ricardo Font – Product Marketing Manager, Gigamon

About this talk

With the release of TLS 1.3 and the continued rise of external and internal encrypted traffic use, security teams are faced with the dilemma of finding threats within traffic streams that are increasingly obscured. Though many organizations decrypt and inspect traffic due to both security and regulatory concerns, there are many that are effectively blind to threats that are communicating via encrypted channels. However, the news is not all grim; join (ISC)² and Gigamon as we dive into discovery methodologies that can be used to detect threats within encrypted traffic without the need for decryption. You’ll learn: - Threat detection methodologies - Encryption-agnostic detection techniques - Detailed breakdown of what encrypted traffic can reveal - Best practices
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (315)
Subscribers (22678)
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.