A strong defensive perimeter is critical in preventing your organization from common threats. But what happens when something slips through the perimeter defenses? Especially the advanced threat actors will eventually circumvent even the best defenses. When a breach occurs, a quick detection will make all the difference for the whole remediation process.
In this webinar, Marko Finnig, Director of Advanced Threat Protection at F-Secure Corporate’s Cyber Security Service Business Unit, will take you through the second critical aspect of the holistic cyber security approach: Detect. How advanced threat actors work and how to detect them. He’ll also provide insights on solution approaches for detection. As well as the do’s and don’ts.
If you wish to download the full set of slides in PDF, the slides are available at F-Secure’s Business Secure Insider: https://business.f-secure.com/how-to-detect-a-cyber-security-breach
Views : 14458