Star 0

Abstract

The majority of attacks will use SSL/TLS over next 2 years. This leaves blind spots in layered defenses. This session provides architects and operations teams the needed understanding of the new threatscape. It provides a vendor­neutral evaluation of developing architectures for SSL/TLS inspection, securing keys and certificates necessary for decryption, and operating decryption systems.