Get visibility into encrypted traffic
You will discover how to:
- Get visibility into actionable metadata on encrypted streams without breaking and inspecting payloads
- Get visibility into the use of self-signed certificates, fingerprint SSH and SSL traffic, identify encryption on non-standard ports, and more.
- Get new insights into SSH traffic, like activities such as file transfer over SSH
Speakers
Vince Stoffer
Vince Stoffer is Field CTO at Corelight and previously held security engineering and network management positions at Lawrence Berkeley National Laboratory and before that served as a network security engineer at Reed College. Vince holds the CISSP, GCIH and GCIA certifications.
John Gamble
Director of Product Marketing, Corelight
John Gamble is Director of Product Marketing at Corelight and has spent more than a decade in the data protection industry representing cybersecurity, privacy and identity verification solutions, including his most recent role as Director of Product Marketing at Lookout, a mobile endpoint security company.
Jon Garside
Senior Director Product Marketing, Devo
Jon Garside is a veteran of cybersecurity and Devo's vCISO ambassador. With 25 years of experience as a military intelligence lead hacker, CISO, and security practice evangelist, Jon is passionate about security as the #1 topic in the boardroom.Josef Gustafsson
Josef Gustafsson is a Systems Engineer at Corelight Nordics. With a background in securing critical networks, he helps defenders respond to threats by gaining visibility into adversary activity across their on-premise, private- and public cloud environments.