Zero Trust in an Encrypted World
Featuring
About This Webinar
Regardless of which Zero Trust model you are utilizing, there are some universal solutions that will be common amongst them. Threat actors are observed using the same tactics and techniques over and over again. In this presentation, we will briefly examine two top models and then explore what that means on a practical level. We will broadly look at some traditional network visibility solutions and challenge some of the norms around these systems. Do they really solve the problem in the best way in a world where everything is encrypted and threat actors hide in plain sight?
-
Host Scott Bekker Webinar Moderator ActualTech Media
-
Featuring Stephen Goudreault Cloud Security Evangelist Gigamon
What You'll Learn
- Can classic tools such as logging really solve for the visibility gap?
- How to deal with the encryption/decryption paradox?
- What method can solve for lateral visibility?