ON DEMAND WEBCAST

Get visibility into encrypted traffic

You will discover how to:

  • Get visibility into actionable metadata on encrypted streams without breaking and inspecting payloads
  • Get visibility into the use of self-signed certificates, fingerprint SSH and SSL traffic, identify encryption on non-standard ports, and more.
  • Get new insights into SSH traffic, like activities such as file transfer over SSH

Speakers

Vince Stoffer

Field CTO, Corelight

Vince Stoffer is Field CTO at Corelight and previously held security engineering and network management positions at Lawrence Berkeley National Laboratory and before that served as a network security engineer at Reed College. Vince holds the CISSP, GCIH and GCIA certifications.

John Gamble

Director of Product Marketing, Corelight

John Gamble is Director of Product Marketing at Corelight and has spent more than a decade in the data protection industry representing cybersecurity, privacy and identity verification solutions, including his most recent role as Director of Product Marketing at Lookout, a mobile endpoint security company.

Jon Garside

Senior Director Product Marketing, Devo

Jon Garside is a veteran of cybersecurity and Devo's vCISO ambassador. With 25 years of experience as a military intelligence lead hacker, CISO, and security practice evangelist, Jon is passionate about security as the #1 topic in the boardroom.

Josef Gustafsson

Systems Engineer

Josef Gustafsson is a Systems Engineer at Corelight Nordics. With a background in securing critical networks, he helps defenders respond to threats by gaining visibility into adversary activity across their on-premise, private- and public cloud environments.

Jan Grashöfer

Security Researcher

Jan is a Security Researcher working in Corelight's Labs team. Back in 2015, during an internship in the security team of the European Organization for Nuclear Research (CERN), Jan became a fan of Zeek and started contributing to the project. After graduating, he joined a research group at Karlsruhe Institute of Technology (KIT) focusing on network security monitoring. At Corelight, Jan combines his theoretical background in computer science and information security with his passion for engineering practical solutions to protect networks.