The ‘Dark’ Web Inside Your Enterprise – Shining a Light on the Hazards of Encrypted Traffic

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Attackers are actively exploiting the SSL blind spot. Through a well-defined encrypted traffic management strategy organisations can gain the visibility required to conduct cyber-security activities, whilst balancing the requirements for employee privacy.

Many of the mechanisms used to keep attackers out of and data within an organisation are blind to what lies within encrypted traffic. This presents a serious risk that is often not adequately addressed and attackers exploit this amongst other techniques to mask their activities. Through the pervasiveness of encryption, organisations should increasingly look to adopting a strategic approach to encrypted traffic management 

This webinar will explain the rise of encryption, the challenges it presents and the need to equip the business with a more strategic and ‘transparent’ approach:

  • Understanding what you do and don’t control and how to effectively address the different uses of encryption
  • Maximising investments in existing security tools such as IPS, web security and analytics platforms
  • Protecting against APTs and mass market malware
  • The need for privacy and a policy-based approach


Yiannis Pavlosoglou

Co-chair of the (ISC)² EMEA Advisory Council

    Stephen Pritchard

    Moderator, Infosecurity Magazine

      Matt Schofield

      Senior Solution Architect, NTT Ltd

        Paul Simmonds

        CEO Global Identify Foundation

          James Stevenson

          EMEA Security Director Advanced Threat Protection Group, Blue Coat

            Brought to You by

            Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.