Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

The ‘Dark’ Web Inside Your Enterprise – Shining a Light on the Hazards of Encrypted Traffic

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Attackers are actively exploiting the SSL blind spot. Through a well-defined encrypted traffic management strategy organisations can gain the visibility required to conduct cyber-security activities, whilst balancing the requirements for employee privacy.

Many of the mechanisms used to keep attackers out of and data within an organisation are blind to what lies within encrypted traffic. This presents a serious risk that is often not adequately addressed and attackers exploit this amongst other techniques to mask their activities. Through the pervasiveness of encryption, organisations should increasingly look to adopting a strategic approach to encrypted traffic management 

This webinar will explain the rise of encryption, the challenges it presents and the need to equip the business with a more strategic and ‘transparent’ approach:

  • Understanding what you do and don’t control and how to effectively address the different uses of encryption
  • Maximising investments in existing security tools such as IPS, web security and analytics platforms
  • Protecting against APTs and mass market malware
  • The need for privacy and a policy-based approach

Speakers

Yiannis Pavlosoglou

Co-chair of the (ISC)² EMEA Advisory Council

    Stephen Pritchard

    Moderator, Infosecurity Magazine

      Matt Schofield

      Senior Solution Architect, NTT Security

        Paul Simmonds

        CEO Global Identify Foundation

          James Stevenson

          EMEA Security Director Advanced Threat Protection Group, Blue Coat

            Brought to You by