Here Be Dragons: The Double-Edged Sword That Is TLS

Logo
Presented by

Ian Farquhar, Consulting Sales Engineer at Gigamon

About this talk

TLS is becoming ubiquitous, but it’s a double-edged sword. On the one side, organizations can mitigate risk vectors using this protocol. On the flipside is the misuse of TLS by threat actors trying to hide their activities and prevent your security monitoring infrastructure from detecting their activities. How do you benefit from TLS, but avoid the risks? Is decrypting everything the right approach? And if so, where? What about non-decrypting approaches to threat detection, like JA3? TLS 1.3 was a significant change, what do I need to know about it? Join Gigamon and (ISC)2 to get answers to these questions and more. Watch this webinar to learn the answer to this question, plus: · Whether or not decrypting everything the right approach · How non-decrypting approaches to threat detection, such as JA3, compare · What you need to know about TLS 1.3
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (152)
Subscribers (5071)
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.