Defeating Encryption on a Hostile Network
3:00pm - 3:45pm
This presentation will connect some dots that most folks see as isolated, when in fact, they frequently are connected during cyber investigations. There will be a review of assumptions that contribute to risky network behaviors. There will be a walk thru of analyzing samples of network evil that attack encryption. There is a summary of foreign attacker activities. Steps are proposed to mitigate the exposure all of this brings to sensitive data.
With lots of information in a short time, the pace will be fast. Don't bother writing down references. A pointer to the source documents will be provided.