Zero Trust in An Encrypted World

Logo
Presented by

Stephen Goudreault, Cloud Security Evangelist - Gigamon

About this talk

Regardless of which Zero Trust model you are utilizing, there are some universal solutions that will be common amongst them. Threat actors are observed using the same tactics and techniques over and over again. In this presentation, we will briefly examine two top models and then explore what that means on a practical level. We will broadly look at some traditional network visibility solutions and challenge some of the norms around these systems. Do they really solve the problem in the best way in a world where everything is encrypted and threat actors hide in plain sight? Key takeaways: - Can classic tools such as logging really solve for the visibility gap? - How to deal with the encryption/decryption paradox? - What method can solve for lateral visibility?
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (106)
Subscribers (6454)
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.