Star 0

Abstract

The majority of attacks will use SSL/TLS over the next two years. This leaves blind spots in layered defenses. This session provides architects and operations teams the needed understanding of the new threatscape. It provides a vendor-neutral evaluation of developing architectures for SSL/TLS inspection, securing keys and certificates necessary for decryption, and operating decryption systems.