Field Notes—Leveraging Encrypted Artifacts

ABOUT THIS WEBINAR
Chalk it up to remote work, digital transformation, and a multitude of software tools —the past few years have dramatically increased the amount of encrypted traffic flowing through enterprise networks. And while your security arsenal may include decryption tools, decryption is a costly—and often complex—solution.

Please join us for this advanced webinar where encryption expert and senior engineer Cody Spooner, and systems engineer, Kal Ramkumar demonstrate the good, the bad, and the ugly when it comes to encryption. Learn how your organization can get strong forensic value out of encrypted traffic, plus we'll view use cases to determine what was happening (and what was done) to detect and defend.

Date: March 8, 2023
Time: 11:00 AM Eastern
Duration: 60 minutes
AGENDA
  • Learn how to infer behaviors based on encrypted artifacts
  • Learn to identify weak ciphers and ensure your traffic is well encrypted
  • Learn how to leverage JA3/s for TLS fingerprinting
ADDITIONAL INFO
  • Duration: 1 hour
  • Price: Free
  • Language: English
  • Who can attend? Anyone with the event link can attend
  • Dial-in available? (listen only): Not available.
FEATURED PRESENTERS
HOSTED BY
ATTENDED (49)