SSL Threats are Here—Is Your Architecture Ready?
The majority of attacks will use SSL/TLS over next 2 years. This leaves blind spots in layered defenses. This session provides architects and operations teams the needed understanding of the new threatscape. It provides a vendorneutral evaluation of developing architectures for SSL/TLS inspection, securing keys and certificates necessary for decryption, and operating decryption systems.