Submit Search
Upload
TEDxRotterdam: Mikko Hypponen on Cyber Threats from Organized Criminals, Hactivists and Nation-States
•
2 likes
•
799 views
AI-enhanced title
Mikko Hypponen
Follow
TEDxRotterdam 2011 - Mikko Hypponen - Cyber Threats
Read less
Read more
Technology
Travel
Report
Share
Report
Share
1 of 21
Recommended
Mikko Hypponen. Trys internetinių atakų tipai
Mikko Hypponen. Trys internetinių atakų tipai
TEO LT, AB
Global Asset Protection for a Dangerous World, by Joel Nagel
Global Asset Protection for a Dangerous World, by Joel Nagel
Joel Nagel
Five eyes plus one vulnerabilities
Five eyes plus one vulnerabilities
AnonDownload
CISO PPT
CISO PPT
Bhumika Kaushal
From the Arsenal of Democracy, to Democratizing Security
From the Arsenal of Democracy, to Democratizing Security
Dug Song
Five eyes plus one vulnerabilities
Five eyes plus one vulnerabilities
AnonDownload
Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013
Mikko Hypponen
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Mikko Hypponen
Recommended
Mikko Hypponen. Trys internetinių atakų tipai
Mikko Hypponen. Trys internetinių atakų tipai
TEO LT, AB
Global Asset Protection for a Dangerous World, by Joel Nagel
Global Asset Protection for a Dangerous World, by Joel Nagel
Joel Nagel
Five eyes plus one vulnerabilities
Five eyes plus one vulnerabilities
AnonDownload
CISO PPT
CISO PPT
Bhumika Kaushal
From the Arsenal of Democracy, to Democratizing Security
From the Arsenal of Democracy, to Democratizing Security
Dug Song
Five eyes plus one vulnerabilities
Five eyes plus one vulnerabilities
AnonDownload
Living In A Surveillance State - TEDxBrussels 2013
Living In A Surveillance State - TEDxBrussels 2013
Mikko Hypponen
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
Mikko Hypponen
State of the Net
State of the Net
Mikko Hypponen
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Mikko Hypponen
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
Mikko Hypponen
SXSW - Mikko Hypponen
SXSW - Mikko Hypponen
Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Mikko Hypponen
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
More Related Content
More from Mikko Hypponen
State of the Net
State of the Net
Mikko Hypponen
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Mikko Hypponen
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Mikko Hypponen
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
Mikko Hypponen
SXSW - Mikko Hypponen
SXSW - Mikko Hypponen
Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Mikko Hypponen
More from Mikko Hypponen
(8)
State of the Net
State of the Net
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
The Internet is on Fire - Mikko Hypponen at TEDxBrussels 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
Governments As Malware Authors - Mikko Hypponen at Black Hat 2014
AusCERT - Mikko Hypponen
AusCERT - Mikko Hypponen
SXSW - Mikko Hypponen
SXSW - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
Google Zeitgeist - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
TEDxHelsinki - Mikko Hypponen
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
Recently uploaded
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
Stephanie Beckett
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Precisely
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Fwdays
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
Slibray Presentation
Recently uploaded
(20)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
How to write a Business Continuity Plan
How to write a Business Continuity Plan
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
TEDxRotterdam: Mikko Hypponen on Cyber Threats from Organized Criminals, Hactivists and Nation-States
1.
TEDxRotterdam Mikko Hypponen F-Secure
2.
Cyber Threats Mikko Hypponen CRO,
F-Secure Corp twitter.com/mikko Protecting the irreplaceable | f-secure.com
3.
Organized Online Criminals Protecting
the irreplaceable | f-secure.com
4.
5.
6.
7.
8.
9.
Hactivists Protecting the irreplaceable
| f-secure.com
10.
Creative Commons: anonymous9000
11.
12.
13.
14.
Nation-states Protecting the irreplaceable
| f-secure.com
15.
Protecting the irreplaceable
| f-secure.com
16.
17.
18.
19.
20.
21.
Cyber Threats Mikko Hypponen CRO,
F-Secure Corp twitter.com/mikko Protecting the irreplaceable | f-secure.com