These vulnerabilities - and exploitation of them by threat actors - have dominated the cyber security news cycle for weeks. F-Secure has observed widespread exploitation by multiple threat actors to steal data and install malware to gain further access to organizations’ networks.
In this webcast F-Secure will cover:
Patching will not remove prior compromises, but it will prevent future exploitation. It’s vital organizations find out if they have already been breached.
This access can enable threat actors to:
F-Secure has observed instances of access being used to steal data, install crypto-mining software and ransomware.
Head of Threat Intelligence, F-Secure
Callum is the Head of Threat Intelligence with a history of responding to threat actors on the frontline in incident response, threat hunter and SOC analyst roles. Callum is passionate about all things security and has a wide range of experience delivering services and consultancy across a variety of industries.
Senior Manager, Tactical Defense Unit, F-Secure
Calvin is a security vulnerability expert and Tactical Defense Unit manager leading a team of technical analysts and researchers. Calvin and his team run the defense services that create the rules and detections that power F-Secure security products against new and emerging threats. He also researches the threat landscape and creates reports used by security experts across the globe.
Natalia Cerezo Martin
Director, Customer Engagement, Managed Detection & Response, F‑Secure
Natalia leads F-Secure’s Managed Detection and Response Customer Engagement function whose mission is to deliver an exceptional experience to our customers. She has a wealth of experience in growing high performing customer centric teams both in the cyber security industry and beyond. As part of the F-Secure team, she has recently worked on customer strategy & journey design and implementation within the managed services business.