Here Be Dragons: The Double-Edged Sword That Is TLS

Logo
Presented by

Ian Farquhar, Consulting Sales Engineer at Gigamon

About this talk

TLS is becoming ubiquitous, but it’s a double-edged sword. On the one side, organizations can mitigate risk vectors using this protocol. On the flipside is the misuse of TLS by threat actors trying to hide their activities and prevent your security monitoring infrastructure from detecting their activities. How do you benefit from TLS, but avoid the risks? Is decrypting everything the right approach? And if so, where? What about non-decrypting approaches to threat detection, like JA3? TLS 1.3 was a significant change, what do I need to know about it? Join Gigamon and (ISC)2 to get answers to these questions and more. Watch this webinar to learn the answer to this question, plus: · Whether or not decrypting everything the right approach · How non-decrypting approaches to threat detection, such as JA3, compare · What you need to know about TLS 1.3

Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (80)
Subscribers (3553)
Gigamon provides active visibility into physical and virtual network traffic, enabling stronger security and superior performance. Gigamon’s Visibility Fabric and GigaSECURE, the industry’s first Security Delivery Platform, deliver advanced intelligence so that security, network and application performance management solutions in enterprise, government and service provider networks operate more efficiently and effectively.