How to detect a cyber security breach?

A strong defensive perimeter is critical in preventing your organization from common threats. But what happens when something slips through the perimeter defenses? Especially the advanced threat actors will eventually circumvent even the best defenses. When a breach occurs, a quick detection will make all the difference for the whole remediation process.

In this webinar, Marko Finnig, Director of Advanced Threat Protection at F-Secure Corporate’s Cyber Security Service Business Unit, will take you through the second critical aspect of the holistic cyber security approach: Detect. How advanced threat actors work and how to detect them. He’ll also provide insights on solution approaches for detection. As well as the do’s and don’ts.

If you wish to download the full set of slides in PDF, the slides are available at F-Secure’s Business Secure Insider:


  1. syed Mureed hussain sherazi on March 23, 2020 at 9:11 am

    really interesting and informative video..

  2. Tatu on March 23, 2020 at 9:14 am

    Very interesting video!

  3. Tamilarasi selvam on March 23, 2020 at 9:17 am

    Recently i heard SheIn got hit by Data Breach as says. Do you know how to know whether my data was ruptured or not?

  4. J.S. Volgers on March 23, 2020 at 9:36 am

    mikko do you have an update on this 2016 video?

  5. Negligent Noob play's on March 23, 2020 at 9:49 am

    I sadly got this and got my ip leaked do not trust anything free online Mine got leaked from trying vmovee trying to watch child’s play (2019)

Leave a Comment