Crikeycon 2018: Mark 'Pipes' Piper on the Power of CT Logs π΅οΈββοΈ
Discover how Certificate Transparency (CT) logs are transforming security with insights from Mark 'Pipes' Piper. Learn practical ways to leverage CT logs for improved monitoring and threat detection in this engaging talk.

CrikeyCon
286 views β’ Mar 16, 2018

About this video
This talk is the result of a small personal side project for better understanding CT logs and how they may be used. It resulted in crunching some decent sized data sets (numerous terabytes of compressed data) to extract certificate data relevant for work in NZ & AU, contemplating this datasets use and relevance for both blue and red teams.
We will examine a series of basic questions such as; What are CT logs? What is stored in the logs? How can we access and query these logs? How is any of this useful for attackers and defenders alike?
We will examine a series of basic questions such as; What are CT logs? What is stored in the logs? How can we access and query these logs? How is any of this useful for attackers and defenders alike?
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
286
Likes
7
Duration
26:55
Published
Mar 16, 2018
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now