SlideShare une entreprise Scribd logo
  • Mettre en ligne
  • Accueil
  • Explorer
  • S’identifier
  • S’inscrire
SlideShare une entreprise Scribd logo
  • Accueil
  • Explorer
  • Mettre en ligne
  • S’identifier
  • S’inscrire

Nous avons mis à jour notre politique de confidentialité. Cliquez ici pour consulter les détails. Cliquez ici pour consulter les détails.

×
×
×
×
×
×
Anton Chuvakin

Anton Chuvakin

557 Abonné
109 SlideShares 1 Clipboard 557 Abonné 619 Suivis
  • Débloquer l’utilisateur Bloquer l’utilisateur
109 SlideShares 1 Clipboard 557 Abonné 619 Suivis

Personal Information
Entreprise/Lieu de travail
San Francisco Bay Area, CA United States
Profession
Security Strategy
Site Web
www.chuvakin.org
À propos
Dr. Anton Chuvakin is now involved with security solution strategy at Google Cloud, where he arrived via Chronicle Security (an Alphabet company) acquisition in July 2019. Anton was, until recently, a Research Vice President and Distinguished Analyst at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team. Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. He is an author of books "Security Warrior", "Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management" and others
Coordonnées
Mots-clés
chuvakin security logs logging log management log management siem pci compliance sim sem pci dss cybersecurity incident response analysis security management monitoring soc database forensics information security dss virtualization incident response trends security operations keynote incident handling strategy myths application web proxy ediscovery threat internal insiders loglogic accountability sans threat detection 2020 security analytics log analysis pci compliance standards linux honeynet correlation infosec qualys 2005 metrics baselining anton chuvakin detection and response cloud security cloud-native threats detection cloud computing cloud analytics 2016 log mana security aman u.s. securities and exchange commission security mana log ma data breaches inc worst practices best practices predictions future class williams pci dss myths 2010 why are they still alive by dr log review mistakes log managent honeypots ids intrusion detection cee covert channels malware honeypot compromise discovery regulations chuvakin vulnerability management mining handling
Tout plus
Présentations (80)
Tout voir
Anton Chuvakin on illogic Rootkit Analysis
il y a 16 ans • 3419 Vues
Anton Chuvakin on Honeypots
il y a 16 ans • 1816 Vues
Anton Chuvakin FTP Server Intrusion Investigation
il y a 16 ans • 2645 Vues
Anton Chuvakin on Discovering That Your Linux Box is Hacked
il y a 16 ans • 2219 Vues
Anton Chuvakin on Security Data Centralization
il y a 16 ans • 1261 Vues
Anton Chuvakin on What is NOT Working in Security 2004
il y a 16 ans • 698 Vues
Anton Chuvakin on Threat and Vulnerability Intelligence
il y a 16 ans • 3643 Vues
Six Mistakes of Log Management Teaser Preso
il y a 15 ans • 731 Vues
Log Forensics from CEIC 2007
il y a 15 ans • 1174 Vues
CONFidence 2007 Log Forensics TEASER Preso
il y a 15 ans • 1346 Vues
Interop 2007 Keynote Teaser
il y a 15 ans • 689 Vues
CSI NetSec 2007 Six MIstakes of Log Management by Anton Chuvakin
il y a 15 ans • 2113 Vues
Logs for Information Assurance and Forensics @ USMA
il y a 15 ans • 1068 Vues
Web Proxy Log Analysis and Management 2007
il y a 15 ans • 36092 Vues
Log Mining: Beyond Log Analysis
il y a 15 ans • 20541 Vues
NIST 800-92 Log Management Guide in the Real World
il y a 15 ans • 8771 Vues
Choosing Your Log Management Approach: Buy, Build or Outsource
il y a 14 ans • 3749 Vues
CEE Logging Standard: Today and Tomorrow
il y a 14 ans • 2973 Vues
1st Russian CSO Summit Trends 2008
il y a 14 ans • 1085 Vues
Six Mistakes of Log Management 2008
il y a 14 ans • 2123 Vues
Baselining Logs
il y a 14 ans • 4270 Vues
Security Management Trends 2004
il y a 14 ans • 461 Vues
Old Presentation on Security Metrics 2005
il y a 14 ans • 1394 Vues
What Every Organization Should Log And Monitor
il y a 14 ans • 2219 Vues
O'Reilly Webinar Five Mistakes Log Analysis
il y a 14 ans • 981 Vues
Logs for Incident Response and Forensics: Key Issues for GOVCERT.NL 2008
il y a 14 ans • 2935 Vues
Logs = Accountability
il y a 14 ans • 3380 Vues
Anton's Log Management 'Worst Practices'
il y a 14 ans • 5107 Vues
"Grand Challenges" of Log Management
il y a 14 ans • 3306 Vues
Early Look: Logging and Virtualization
il y a 14 ans • 672 Vues
Documents (29)
Tout voir
"Compliance First" or "Security First"
il y a 13 ans • 1366 Vues
Myths of PCI DSS
il y a 13 ans • 367 Vues
Advanced Log Processing
il y a 13 ans • 987 Vues
Real-time fallacy: how real-time your security really is?
il y a 13 ans • 455 Vues
All Anton's Top11 Log Lists
il y a 13 ans • 1605 Vues
Log Analysis Across System Boundaries for Security, Compliance, and Operations
il y a 13 ans • 406 Vues
Log Data Mining
il y a 13 ans • 8467 Vues
Introduction to Database Log Analysis
il y a 13 ans • 2598 Vues
Where Logs Hide: Logs in Virtualized Environments
il y a 13 ans • 273 Vues
Five Mistakes of Vulnerability Management
il y a 13 ans • 637 Vues
Log Management in the Age of Compliance
il y a 13 ans • 308 Vues
Discovery of Compromised Machines
il y a 13 ans • 840 Vues
Computer Forensics in the Age of Compliance
il y a 13 ans • 724 Vues
Automated Incident Handling Using SIM
il y a 13 ans • 691 Vues
Days of the Honeynet: Attacks, Tools, Incidents
il y a 13 ans • 522 Vues
Chroot Protection and Breaking
il y a 13 ans • 2878 Vues
Covert Channels
il y a 13 ans • 5269 Vues
Security Event Analysis Through Correlation
il y a 13 ans • 7135 Vues
Take back your security infrastructure
il y a 13 ans • 683 Vues
Importance Of Structured Incident Response Process
il y a 13 ans • 5899 Vues
Audit logs for Security and Compliance
il y a 13 ans • 4471 Vues
Data hiding and finding on Linux
il y a 13 ans • 2546 Vues
Five IDS mistakes people make
il y a 13 ans • 483 Vues
Log Analysis Across System Boundaries for Security, Compliance, and Operations
il y a 13 ans • 619 Vues
Five Mistakes of Incident Response
il y a 13 ans • 942 Vues
Honeypot Essentials
il y a 13 ans • 2421 Vues
Logging "BrainBox" Short Article
il y a 13 ans • 599 Vues
What do I really need to do to STAY compliant with PCI DSS?
il y a 13 ans • 717 Vues
Log Management for PCI Compliance [OLD]
il y a 13 ans • 1247 Vues
J’aime (180)
Tout voir
Breaking The Cloud Kill Chain
Puma Security, LLC • il y a 1 semaine
Alert Fidelity Measuring Detection Quality - march2019
Martin Potgieter • il y a 1 an
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin • il y a 1 an
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin • il y a 1 an
DevSecOps: Key Controls to Modern Security Success
Puma Security, LLC • il y a 3 ans
50 Shades of Sigma
Florian Roth • il y a 2 ans
13 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy • il y a 2 ans
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; Keith McCammon, Red Canary
MITRE - ATT&CKcon • il y a 3 ans
Измерение эффективности SOC. 3 года спустя
Aleksey Lukatskiy • il y a 3 ans
Finding attacks with these 6 events
Michael Gough • il y a 6 ans
Deeplook into apt and how to detect and defend v1.0
Michael Gough • il y a 7 ans
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Joe Slowik • il y a 4 ans
Airbnb - StreamAlert
Amazon Web Services • il y a 4 ans
SplunkLive Brisbane Splunking the Endpoint
Splunk • il y a 6 ans
Security Analyst Workshop - 20190314
Florian Roth • il y a 3 ans
The Four Types of Threat Detection and Use Cases in Industrial Security
Dragos, Inc. • il y a 4 ans
5 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy • il y a 3 ans
SACON - Enterprise Security Architecture (Bikash Barai)
Priyanka Aash • il y a 5 ans
Машинное обучение в кибербезопасности
Aleksey Lukatskiy • il y a 3 ans
EDR vs SIEM - The fight is on
Justin Henderson • il y a 5 ans
TOGAF 9 - Security Architecture Ver1 0
Maganathin Veeraragaloo • il y a 12 ans
Security architecture
Duncan Unwin • il y a 9 ans
Incident Response Triage
Albert Hui • il y a 11 ans
The Art and Science of Alert Triage
Sqrrl • il y a 7 ans
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Raffael Marty • il y a 5 ans
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty • il y a 4 ans
Adversarial Simulation Nickerson/Gates Wild West Hacking Fest Oct 2017
Chris Gates • il y a 5 ans
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Chris Nickerson
Chris Gates • il y a 6 ans
How to play NLP Games - NLP Academy
Eva Johnson • il y a 6 ans
Ландшафт технологий кибербезопасности 2025
Aleksey Lukatskiy • il y a 5 ans
SOC vs SIEM
Aleksey Lukatskiy • il y a 5 ans
Threat Hunting with Splunk Hands-on
Splunk • il y a 5 ans
Threat Hunting with Splunk
Splunk • il y a 5 ans
пр Про SOC: Зачем это надо и когда начать думать про строительство
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 5 ans
Internet Trends 2017 Report
Kleiner Perkins • il y a 5 ans
Трудовые будни охотника на угрозы
Sergey Soldatov • il y a 5 ans
Нюансы функционирования и эксплуатации Cisco SOC
Aleksey Lukatskiy • il y a 5 ans
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Alex Pinto • il y a 5 ans
Free RvSIEM. Intro (Rus)
Olesya Shelestova • il y a 5 ans
A Threat Hunter Himself
Sergey Soldatov • il y a 6 ans
Охота на угрозы на BIS summit 2016
Sergey Soldatov • il y a 5 ans
Threat hunting as SOC process
Sergey Soldatov • il y a 5 ans
Beyond Matching: Applying Data Science Techniques to IOC-based Detection
Alex Pinto • il y a 5 ans
Pets vs. Cattle: The Elastic Cloud Story
Randy Bias • il y a 8 ans
Integrity journal
Daria Kutuzova • il y a 6 ans
Rusiem 2017_обзор
Olesya Shelestova • il y a 6 ans
User and entity behavior analytics: building an effective solution
Yolanta Beresna • il y a 6 ans
UEBA – поведенческий анализ, а не то, что Вы подумали
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 6 ans
Корреляция в SIEM системах
Olesya Shelestova • il y a 6 ans
пр После внедрения Dlp (прозоров)
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 6 ans
So, you wanna be a pen tester
Adrien de Beaupre • il y a 6 ans
Machine Duping 101: Pwning Deep Learning Systems
Clarence Chio • il y a 6 ans
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
Alex Pinto • il y a 6 ans
RuSIEM. Потребители. Состав продукта. Отличия. Применение.
Olesya Shelestova • il y a 6 ans
пр Модель зрелости Dlp
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 7 ans
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Source Conference • il y a 11 ans
RuSIEM 2016
Olesya Shelestova • il y a 6 ans
Going Purple : From full time breaker to part time fixer: 1 year later
Chris Gates • il y a 7 ans
Living with the threat of Determined Attackers - RANT0214
James '​-- Mckinlay • il y a 8 ans
Enterprise Security Architecture
Kris Kimmerle • il y a 8 ans
Security Event Analysis Through Correlation
Anton Chuvakin • il y a 13 ans
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
F _ • il y a 9 ans
Implementing and Running SIEM: Approaches and Lessons
Anton Chuvakin • il y a 13 ans
Yours Anecdotally: Developing a Cybersecurity Problem Space
Jack Whitsitt • il y a 7 ans
Large Scale Log Analytics with Solr (from Lucene Revolution 2015)
Sematext Group, Inc. • il y a 7 ans
CSCSS Science of Security - Developing Scientific Foundations for the Operational Cybersecurity Ecosystem
Shawn Riley • il y a 7 ans
Building Security Operation Center
S.E. CTS CERT-GOV-MD • il y a 9 ans
HP ArcSight & Ayehu eyeShare - Security Automation
cohen88or • il y a 8 ans
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
Anton Goncharov • il y a 8 ans
You Can't Correlate what you don't have - ArcSight Protect 2011
Scott Carlson • il y a 9 ans
Security Onion Conference - 2015
DefensiveDepth • il y a 7 ans
Windows logging cheat sheet
Michael Gough • il y a 7 ans
пр 02.Устройство и Сервисы JSOC
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 7 ans
пр 03.JSOC inside
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 7 ans
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling Indicators
Alex Pinto • il y a 7 ans
How to Choose the Right Security Information and Event Management (SIEM) Solution
IBM Security • il y a 7 ans
Implementing An Automated Incident Response Architecture
Priyanka Aash • il y a 7 ans
YBB-NW-distribution
Mike Saunders • il y a 7 ans
You Will Be Breached
Mike Saunders • il y a 7 ans
Attack-driven defense
Zane Lackey • il y a 9 ans
ruxc0n 2012
mimeframe • il y a 10 ans
Mm Гандапас про ораторское искусство
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 7 ans
Visualization in the Age of Big Data
Raffael Marty • il y a 7 ans
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Shawn Riley • il y a 8 ans
My Keynote from BSidesTampa 2015 (video in description)
Andrew Case • il y a 7 ans
Экспресс-анализ российского рынка ИБ в условиях курса на импортозамещение
Aleksey Lukatskiy • il y a 7 ans
Invincea: Reasoning in Incident Response in Tapio
Invincea, Inc. • il y a 8 ans
Marketing Tools to Increase Visibility
Gabrielle Branch • il y a 8 ans
Yahoo Enabling Exploratory Analytics of Data in Shared-service Hadoop Clusters
Brett Sheppard • il y a 8 ans
Security Analytics Beyond Cyber
Phil Huggins FBCS CITP • il y a 8 ans
Using Canary Honeypots for Network Security Monitoring
chrissanders88 • il y a 8 ans
Measuring the IQ of your Threat Intelligence Feeds (#tiqtest)
Alex Pinto • il y a 8 ans
Measuring the IQ of your Threat Intelligence Feeds (#tiqtest)
Alex Pinto • il y a 8 ans
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#SecureBecauseMath)
Alex Pinto • il y a 8 ans
Logs = Accountability
Anton Chuvakin • il y a 14 ans
Сравнение ТОП 5 SIEM РФ
Pete Kuzeev • il y a 8 ans
Applied Detection and Analysis Using Flow Data - MIRCon 2014
chrissanders88 • il y a 8 ans
Applied Detection and Analysis Using Flow Data - MIRCon 2014
chrissanders88 • il y a 8 ans
Cisco OpenSOC
James Sirota • il y a 8 ans
Developing Analytic Technique and Defeating Cognitive Bias in Security
chrissanders88 • il y a 8 ans
Defcon 22-tess-schrodinger-raxacoricofallapatorius-with-love
Priyanka Aash • il y a 8 ans
Security at Scale - Lessons from Six Months at Yahoo
Alex Stamos • il y a 8 ans
Building a Modern Security Engineering Organization
Zane Lackey • il y a 8 ans
Something Fun About Using SIEM by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
Русская ментальность как фактор невозможности адекватного управления ИБ на базе западных практик
Aleksey Lukatskiy • il y a 8 ans
Indicators of Compromise Magic: Living with compromise
F _ • il y a 8 ans
The Heatmap
 - Why is Security Visualization so Hard?
Raffael Marty • il y a 8 ans
Logs vs Insiders
Anton Chuvakin • il y a 14 ans
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
CrowdCasts Monthly: You Have an Adversary Problem
CrowdStrike • il y a 9 ans
Защита информации 2030: о чем стоит думать уже сейчас?!
Aleksey Lukatskiy • il y a 8 ans
The Diamond Model for Intrusion Analysis - Threat Intelligence
ThreatConnect • il y a 8 ans
From Gates to Guardrails: Alternate Approaches to Product Security
Jason Chan • il y a 9 ans
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Alex Pinto • il y a 9 ans
Introducing Intelligence Into Your Malware Analysis
Brian Baskin • il y a 9 ans
SplunkLive! Analytics with Splunk Enterprise - Part 1
Splunk • il y a 9 ans
SplunkLive! Hunk Technical Deep Dive
Splunk • il y a 9 ans
SplunkLive! What's New in Splunk 6 Session
Splunk • il y a 9 ans
Fix What Matters
Ed Bellis • il y a 9 ans
BSidesLV Vulnerability & Exploit Trends
Ed Bellis • il y a 9 ans
Incident management (part 5)
Aleksey Lukatskiy • il y a 12 ans
Big Data for Defense and Security
EMC • il y a 9 ans
Situational Awareness Reference Architecture (SARA) Overview
Chris Blask • il y a 9 ans
Inside Flume
Cloudera, Inc. • il y a 12 ans
An Introduction to Apache Flume
Mike Frampton • il y a 9 ans
An introduction to Apache Chukwa
Mike Frampton • il y a 9 ans
Hive user group presentation from Netflix (3/18/2010)
Eva Tse • il y a 12 ans
Performing Network & Security Analytics with Hadoop
DataWorks Summit • il y a 10 ans
BSidesLV 2013 - Using Machine Learning to Support Information Security
Alex Pinto • il y a 9 ans
Defending Networks with Incomplete Information: A Machine Learning Approach
Alex Pinto • il y a 9 ans
Talk Pretty: 7 Easy Steps to a Better Presentation
Ben Tomhave • il y a 9 ans
Interesting Times: Will Business Survive?
Ben Tomhave • il y a 9 ans
Large Scale Log Analysis with HBase and Solr at Amadeus (Martin Alig, ETH Zurich)
Swiss Big Data User Group • il y a 10 ans
Incident Response in the age of Nation State Cyber Attacks
Resilient Systems • il y a 9 ans
Introducing Co3's Security Incident Response Module
Resilient Systems • il y a 9 ans
Practioners Guide to SOC
AlienVault • il y a 10 ans
Глобальные системы предотвращения атак: международный опыт
Aleksey Lukatskiy • il y a 9 ans
Lares from LOW to PWNED
Chris Gates • il y a 10 ans
Finding Needles in Haystacks (The Size of Countries)
packetloop • il y a 10 ans
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton Chuvakin
Anton Chuvakin • il y a 12 ans
Scaling the Cloud - Cloud Security
Bill Burns • il y a 10 ans
Content Marketing: How Far Do You Open the Kimono
Jay Baer • il y a 11 ans
Shit My Cloud Evangelist Says...Just Not To My CSO
Christofer Hoff • il y a 10 ans
Defending Against Application DoS attacks
Roberto Suggi Liverani • il y a 12 ans
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
Rebuilding for the cloud - How Cloud Architeture Can Improve Application Security
John Kinsella • il y a 10 ans
Cloud Security - A Visibility Challenge
Raffael Marty • il y a 12 ans
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
Anton's Log Management 'Worst Practices'
Anton Chuvakin • il y a 14 ans
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
Blackhat Workshop
wremes • il y a 11 ans
Proactive / Continuous Compliance Approach to PCI DSS by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
Cloud Log Analysis and Visualization
Raffael Marty • il y a 12 ans
ISSA Siem Fraud
Xavier Mertens • il y a 12 ans
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
Anton Chuvakin • il y a 12 ans
Got SIEM? Now what? Getting SIEM Work For You
Anton Chuvakin • il y a 12 ans
Search Analytics with Flume and HBase
Sematext Group, Inc. • il y a 12 ans
10 things we're doing wrong with SIEM
wremes • il y a 12 ans
How to Architect a Novell Sentinel Implementation
Novell • il y a 12 ans
Log Standards & Future Trends by Dr. Anton Chuvakin
Anton Chuvakin • il y a 12 ans
Log Data Mining
Anton Chuvakin • il y a 13 ans
Baselining Logs
Anton Chuvakin • il y a 14 ans
How to Develop Content Using the Novell Sentinel Software Development Kit
Novell • il y a 12 ans
Active Insight - Event Stream Processing In The Cloud
Mike Telem • il y a 13 ans
Making Log Data Useful: SIEM and Log Management Together
Anton Chuvakin • il y a 12 ans
PCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
Anton Chuvakin • il y a 12 ans
Spirit of PCI DSS by Dr. Anton Chuvakin
Anton Chuvakin • il y a 12 ans
IANS Navigating the Data Stream without Boiling the Ocean: Case Studies in Effective Log Management by Dr. Anton Chuvakin
Anton Chuvakin • il y a 12 ans
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Anton Chuvakin • il y a 12 ans
Evangelizing Yourself
Whitney Hess • il y a 13 ans
Credit Card Processing for Small Business
Mark Ginnebaugh • il y a 13 ans
Enterprise Cloud Risk And Security
Mark Masterson • il y a 13 ans
2009_06_08 The Lean Startup Tokyo edition
Eric Ries • il y a 13 ans
22 Smart, Inspirational Quotes From Bloggers In 2008
Adam Singer • il y a 13 ans
Next Generation Security Event Management (SEM) with Complex Event Processing (CEP)
Tim Bass • il y a 14 ans
"Grand Challenges" of Log Management
Anton Chuvakin • il y a 14 ans
Volha Chuvakin Ph.D. Defense Presentation "Some Aspects of Internet Portal Market Competition"
volha_chuvakin • il y a 15 ans
Log Mining: Beyond Log Analysis
Anton Chuvakin • il y a 15 ans
Intrusion Alert Correlation
amiable_indian • il y a 15 ans
  • Activité
  • À propos

Présentations (80)
Tout voir
Anton Chuvakin on illogic Rootkit Analysis
il y a 16 ans • 3419 Vues
Anton Chuvakin on Honeypots
il y a 16 ans • 1816 Vues
Anton Chuvakin FTP Server Intrusion Investigation
il y a 16 ans • 2645 Vues
Anton Chuvakin on Discovering That Your Linux Box is Hacked
il y a 16 ans • 2219 Vues
Anton Chuvakin on Security Data Centralization
il y a 16 ans • 1261 Vues
Anton Chuvakin on What is NOT Working in Security 2004
il y a 16 ans • 698 Vues
Anton Chuvakin on Threat and Vulnerability Intelligence
il y a 16 ans • 3643 Vues
Six Mistakes of Log Management Teaser Preso
il y a 15 ans • 731 Vues
Log Forensics from CEIC 2007
il y a 15 ans • 1174 Vues
CONFidence 2007 Log Forensics TEASER Preso
il y a 15 ans • 1346 Vues
Interop 2007 Keynote Teaser
il y a 15 ans • 689 Vues
CSI NetSec 2007 Six MIstakes of Log Management by Anton Chuvakin
il y a 15 ans • 2113 Vues
Logs for Information Assurance and Forensics @ USMA
il y a 15 ans • 1068 Vues
Web Proxy Log Analysis and Management 2007
il y a 15 ans • 36092 Vues
Log Mining: Beyond Log Analysis
il y a 15 ans • 20541 Vues
NIST 800-92 Log Management Guide in the Real World
il y a 15 ans • 8771 Vues
Choosing Your Log Management Approach: Buy, Build or Outsource
il y a 14 ans • 3749 Vues
CEE Logging Standard: Today and Tomorrow
il y a 14 ans • 2973 Vues
1st Russian CSO Summit Trends 2008
il y a 14 ans • 1085 Vues
Six Mistakes of Log Management 2008
il y a 14 ans • 2123 Vues
Baselining Logs
il y a 14 ans • 4270 Vues
Security Management Trends 2004
il y a 14 ans • 461 Vues
Old Presentation on Security Metrics 2005
il y a 14 ans • 1394 Vues
What Every Organization Should Log And Monitor
il y a 14 ans • 2219 Vues
O'Reilly Webinar Five Mistakes Log Analysis
il y a 14 ans • 981 Vues
Logs for Incident Response and Forensics: Key Issues for GOVCERT.NL 2008
il y a 14 ans • 2935 Vues
Logs = Accountability
il y a 14 ans • 3380 Vues
Anton's Log Management 'Worst Practices'
il y a 14 ans • 5107 Vues
"Grand Challenges" of Log Management
il y a 14 ans • 3306 Vues
Early Look: Logging and Virtualization
il y a 14 ans • 672 Vues
Documents (29)
Tout voir
"Compliance First" or "Security First"
il y a 13 ans • 1366 Vues
Myths of PCI DSS
il y a 13 ans • 367 Vues
Advanced Log Processing
il y a 13 ans • 987 Vues
Real-time fallacy: how real-time your security really is?
il y a 13 ans • 455 Vues
All Anton's Top11 Log Lists
il y a 13 ans • 1605 Vues
Log Analysis Across System Boundaries for Security, Compliance, and Operations
il y a 13 ans • 406 Vues
Log Data Mining
il y a 13 ans • 8467 Vues
Introduction to Database Log Analysis
il y a 13 ans • 2598 Vues
Where Logs Hide: Logs in Virtualized Environments
il y a 13 ans • 273 Vues
Five Mistakes of Vulnerability Management
il y a 13 ans • 637 Vues
Log Management in the Age of Compliance
il y a 13 ans • 308 Vues
Discovery of Compromised Machines
il y a 13 ans • 840 Vues
Computer Forensics in the Age of Compliance
il y a 13 ans • 724 Vues
Automated Incident Handling Using SIM
il y a 13 ans • 691 Vues
Days of the Honeynet: Attacks, Tools, Incidents
il y a 13 ans • 522 Vues
Chroot Protection and Breaking
il y a 13 ans • 2878 Vues
Covert Channels
il y a 13 ans • 5269 Vues
Security Event Analysis Through Correlation
il y a 13 ans • 7135 Vues
Take back your security infrastructure
il y a 13 ans • 683 Vues
Importance Of Structured Incident Response Process
il y a 13 ans • 5899 Vues
Audit logs for Security and Compliance
il y a 13 ans • 4471 Vues
Data hiding and finding on Linux
il y a 13 ans • 2546 Vues
Five IDS mistakes people make
il y a 13 ans • 483 Vues
Log Analysis Across System Boundaries for Security, Compliance, and Operations
il y a 13 ans • 619 Vues
Five Mistakes of Incident Response
il y a 13 ans • 942 Vues
Honeypot Essentials
il y a 13 ans • 2421 Vues
Logging "BrainBox" Short Article
il y a 13 ans • 599 Vues
What do I really need to do to STAY compliant with PCI DSS?
il y a 13 ans • 717 Vues
Log Management for PCI Compliance [OLD]
il y a 13 ans • 1247 Vues
J’aime (180)
Tout voir
Breaking The Cloud Kill Chain
Puma Security, LLC • il y a 1 semaine
Alert Fidelity Measuring Detection Quality - march2019
Martin Potgieter • il y a 1 an
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin • il y a 1 an
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin • il y a 1 an
DevSecOps: Key Controls to Modern Security Success
Puma Security, LLC • il y a 3 ans
50 Shades of Sigma
Florian Roth • il y a 2 ans
13 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy • il y a 2 ans
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; Keith McCammon, Red Canary
MITRE - ATT&CKcon • il y a 3 ans
Измерение эффективности SOC. 3 года спустя
Aleksey Lukatskiy • il y a 3 ans
Finding attacks with these 6 events
Michael Gough • il y a 6 ans
Deeplook into apt and how to detect and defend v1.0
Michael Gough • il y a 7 ans
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Joe Slowik • il y a 4 ans
Airbnb - StreamAlert
Amazon Web Services • il y a 4 ans
SplunkLive Brisbane Splunking the Endpoint
Splunk • il y a 6 ans
Security Analyst Workshop - 20190314
Florian Roth • il y a 3 ans
The Four Types of Threat Detection and Use Cases in Industrial Security
Dragos, Inc. • il y a 4 ans
5 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy • il y a 3 ans
SACON - Enterprise Security Architecture (Bikash Barai)
Priyanka Aash • il y a 5 ans
Машинное обучение в кибербезопасности
Aleksey Lukatskiy • il y a 3 ans
EDR vs SIEM - The fight is on
Justin Henderson • il y a 5 ans
TOGAF 9 - Security Architecture Ver1 0
Maganathin Veeraragaloo • il y a 12 ans
Security architecture
Duncan Unwin • il y a 9 ans
Incident Response Triage
Albert Hui • il y a 11 ans
The Art and Science of Alert Triage
Sqrrl • il y a 7 ans
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Raffael Marty • il y a 5 ans
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty • il y a 4 ans
Adversarial Simulation Nickerson/Gates Wild West Hacking Fest Oct 2017
Chris Gates • il y a 5 ans
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Chris Nickerson
Chris Gates • il y a 6 ans
How to play NLP Games - NLP Academy
Eva Johnson • il y a 6 ans
Ландшафт технологий кибербезопасности 2025
Aleksey Lukatskiy • il y a 5 ans
SOC vs SIEM
Aleksey Lukatskiy • il y a 5 ans
Threat Hunting with Splunk Hands-on
Splunk • il y a 5 ans
Threat Hunting with Splunk
Splunk • il y a 5 ans
пр Про SOC: Зачем это надо и когда начать думать про строительство
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 5 ans
Internet Trends 2017 Report
Kleiner Perkins • il y a 5 ans
Трудовые будни охотника на угрозы
Sergey Soldatov • il y a 5 ans
Нюансы функционирования и эксплуатации Cisco SOC
Aleksey Lukatskiy • il y a 5 ans
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Alex Pinto • il y a 5 ans
Free RvSIEM. Intro (Rus)
Olesya Shelestova • il y a 5 ans
A Threat Hunter Himself
Sergey Soldatov • il y a 6 ans
Охота на угрозы на BIS summit 2016
Sergey Soldatov • il y a 5 ans
Threat hunting as SOC process
Sergey Soldatov • il y a 5 ans
Beyond Matching: Applying Data Science Techniques to IOC-based Detection
Alex Pinto • il y a 5 ans
Pets vs. Cattle: The Elastic Cloud Story
Randy Bias • il y a 8 ans
Integrity journal
Daria Kutuzova • il y a 6 ans
Rusiem 2017_обзор
Olesya Shelestova • il y a 6 ans
User and entity behavior analytics: building an effective solution
Yolanta Beresna • il y a 6 ans
UEBA – поведенческий анализ, а не то, что Вы подумали
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 6 ans
Корреляция в SIEM системах
Olesya Shelestova • il y a 6 ans
пр После внедрения Dlp (прозоров)
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 6 ans
So, you wanna be a pen tester
Adrien de Beaupre • il y a 6 ans
Machine Duping 101: Pwning Deep Learning Systems
Clarence Chio • il y a 6 ans
SANS CTI Summit 2016 - Data-Driven Threat Intelligence: Sharing
Alex Pinto • il y a 6 ans
RuSIEM. Потребители. Состав продукта. Отличия. Применение.
Olesya Shelestova • il y a 6 ans
пр Модель зрелости Dlp
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 7 ans
Anton Chuvakin - So You Got That SIEM, NOW What Do You Do?
Source Conference • il y a 11 ans
RuSIEM 2016
Olesya Shelestova • il y a 6 ans
Going Purple : From full time breaker to part time fixer: 1 year later
Chris Gates • il y a 7 ans
Living with the threat of Determined Attackers - RANT0214
James '​-- Mckinlay • il y a 8 ans
Enterprise Security Architecture
Kris Kimmerle • il y a 8 ans
Security Event Analysis Through Correlation
Anton Chuvakin • il y a 13 ans
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
F _ • il y a 9 ans
Implementing and Running SIEM: Approaches and Lessons
Anton Chuvakin • il y a 13 ans
Yours Anecdotally: Developing a Cybersecurity Problem Space
Jack Whitsitt • il y a 7 ans
Large Scale Log Analytics with Solr (from Lucene Revolution 2015)
Sematext Group, Inc. • il y a 7 ans
CSCSS Science of Security - Developing Scientific Foundations for the Operational Cybersecurity Ecosystem
Shawn Riley • il y a 7 ans
Building Security Operation Center
S.E. CTS CERT-GOV-MD • il y a 9 ans
HP ArcSight & Ayehu eyeShare - Security Automation
cohen88or • il y a 8 ans
Improving IR Workflow - Using Risk-Based Escalation in HP ArcSight ESM
Anton Goncharov • il y a 8 ans
You Can't Correlate what you don't have - ArcSight Protect 2011
Scott Carlson • il y a 9 ans
Security Onion Conference - 2015
DefensiveDepth • il y a 7 ans
Windows logging cheat sheet
Michael Gough • il y a 7 ans
пр 02.Устройство и Сервисы JSOC
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 7 ans
пр 03.JSOC inside
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 7 ans
Data-Driven Threat Intelligence: Useful Methods and Measurements for Handling Indicators
Alex Pinto • il y a 7 ans
How to Choose the Right Security Information and Event Management (SIEM) Solution
IBM Security • il y a 7 ans
Implementing An Automated Incident Response Architecture
Priyanka Aash • il y a 7 ans
YBB-NW-distribution
Mike Saunders • il y a 7 ans
You Will Be Breached
Mike Saunders • il y a 7 ans
Attack-driven defense
Zane Lackey • il y a 9 ans
ruxc0n 2012
mimeframe • il y a 10 ans
Mm Гандапас про ораторское искусство
Andrey Prozorov, CISM, CIPP/E, CDPSE. LA 27001 • il y a 7 ans
Visualization in the Age of Big Data
Raffael Marty • il y a 7 ans
Science of Security: Cyber Ecosystem Attack Analysis Methodology
Shawn Riley • il y a 8 ans
My Keynote from BSidesTampa 2015 (video in description)
Andrew Case • il y a 7 ans
Экспресс-анализ российского рынка ИБ в условиях курса на импортозамещение
Aleksey Lukatskiy • il y a 7 ans
Invincea: Reasoning in Incident Response in Tapio
Invincea, Inc. • il y a 8 ans
Marketing Tools to Increase Visibility
Gabrielle Branch • il y a 8 ans
Yahoo Enabling Exploratory Analytics of Data in Shared-service Hadoop Clusters
Brett Sheppard • il y a 8 ans
Security Analytics Beyond Cyber
Phil Huggins FBCS CITP • il y a 8 ans
Using Canary Honeypots for Network Security Monitoring
chrissanders88 • il y a 8 ans
Measuring the IQ of your Threat Intelligence Feeds (#tiqtest)
Alex Pinto • il y a 8 ans
Measuring the IQ of your Threat Intelligence Feeds (#tiqtest)
Alex Pinto • il y a 8 ans
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#SecureBecauseMath)
Alex Pinto • il y a 8 ans
Logs = Accountability
Anton Chuvakin • il y a 14 ans
Сравнение ТОП 5 SIEM РФ
Pete Kuzeev • il y a 8 ans
Applied Detection and Analysis Using Flow Data - MIRCon 2014
chrissanders88 • il y a 8 ans
Applied Detection and Analysis Using Flow Data - MIRCon 2014
chrissanders88 • il y a 8 ans
Cisco OpenSOC
James Sirota • il y a 8 ans
Developing Analytic Technique and Defeating Cognitive Bias in Security
chrissanders88 • il y a 8 ans
Defcon 22-tess-schrodinger-raxacoricofallapatorius-with-love
Priyanka Aash • il y a 8 ans
Security at Scale - Lessons from Six Months at Yahoo
Alex Stamos • il y a 8 ans
Building a Modern Security Engineering Organization
Zane Lackey • il y a 8 ans
Something Fun About Using SIEM by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
Русская ментальность как фактор невозможности адекватного управления ИБ на базе западных практик
Aleksey Lukatskiy • il y a 8 ans
Indicators of Compromise Magic: Living with compromise
F _ • il y a 8 ans
The Heatmap
 - Why is Security Visualization so Hard?
Raffael Marty • il y a 8 ans
Logs vs Insiders
Anton Chuvakin • il y a 14 ans
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
CrowdCasts Monthly: You Have an Adversary Problem
CrowdStrike • il y a 9 ans
Защита информации 2030: о чем стоит думать уже сейчас?!
Aleksey Lukatskiy • il y a 8 ans
The Diamond Model for Intrusion Analysis - Threat Intelligence
ThreatConnect • il y a 8 ans
From Gates to Guardrails: Alternate Approaches to Product Security
Jason Chan • il y a 9 ans
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Alex Pinto • il y a 9 ans
Introducing Intelligence Into Your Malware Analysis
Brian Baskin • il y a 9 ans
SplunkLive! Analytics with Splunk Enterprise - Part 1
Splunk • il y a 9 ans
SplunkLive! Hunk Technical Deep Dive
Splunk • il y a 9 ans
SplunkLive! What's New in Splunk 6 Session
Splunk • il y a 9 ans
Fix What Matters
Ed Bellis • il y a 9 ans
BSidesLV Vulnerability & Exploit Trends
Ed Bellis • il y a 9 ans
Incident management (part 5)
Aleksey Lukatskiy • il y a 12 ans
Big Data for Defense and Security
EMC • il y a 9 ans
Situational Awareness Reference Architecture (SARA) Overview
Chris Blask • il y a 9 ans
Inside Flume
Cloudera, Inc. • il y a 12 ans
An Introduction to Apache Flume
Mike Frampton • il y a 9 ans
An introduction to Apache Chukwa
Mike Frampton • il y a 9 ans
Hive user group presentation from Netflix (3/18/2010)
Eva Tse • il y a 12 ans
Performing Network & Security Analytics with Hadoop
DataWorks Summit • il y a 10 ans
BSidesLV 2013 - Using Machine Learning to Support Information Security
Alex Pinto • il y a 9 ans
Defending Networks with Incomplete Information: A Machine Learning Approach
Alex Pinto • il y a 9 ans
Talk Pretty: 7 Easy Steps to a Better Presentation
Ben Tomhave • il y a 9 ans
Interesting Times: Will Business Survive?
Ben Tomhave • il y a 9 ans
Large Scale Log Analysis with HBase and Solr at Amadeus (Martin Alig, ETH Zurich)
Swiss Big Data User Group • il y a 10 ans
Incident Response in the age of Nation State Cyber Attacks
Resilient Systems • il y a 9 ans
Introducing Co3's Security Incident Response Module
Resilient Systems • il y a 9 ans
Practioners Guide to SOC
AlienVault • il y a 10 ans
Глобальные системы предотвращения атак: международный опыт
Aleksey Lukatskiy • il y a 9 ans
Lares from LOW to PWNED
Chris Gates • il y a 10 ans
Finding Needles in Haystacks (The Size of Countries)
packetloop • il y a 10 ans
Logs: Can’t Hate Them, Won’t Love Them: Brief Log Management Class by Anton Chuvakin
Anton Chuvakin • il y a 12 ans
Scaling the Cloud - Cloud Security
Bill Burns • il y a 10 ans
Content Marketing: How Far Do You Open the Kimono
Jay Baer • il y a 11 ans
Shit My Cloud Evangelist Says...Just Not To My CSO
Christofer Hoff • il y a 10 ans
Defending Against Application DoS attacks
Roberto Suggi Liverani • il y a 12 ans
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
Rebuilding for the cloud - How Cloud Architeture Can Improve Application Security
John Kinsella • il y a 10 ans
Cloud Security - A Visibility Challenge
Raffael Marty • il y a 12 ans
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
Anton's Log Management 'Worst Practices'
Anton Chuvakin • il y a 14 ans
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
Blackhat Workshop
wremes • il y a 11 ans
Proactive / Continuous Compliance Approach to PCI DSS by Dr. Anton Chuvakin
Anton Chuvakin • il y a 11 ans
Cloud Log Analysis and Visualization
Raffael Marty • il y a 12 ans
ISSA Siem Fraud
Xavier Mertens • il y a 12 ans
"You Got That SIEM. Now What Do You Do?"  by Dr. Anton Chuvakin
Anton Chuvakin • il y a 12 ans
Got SIEM? Now what? Getting SIEM Work For You
Anton Chuvakin • il y a 12 ans
Search Analytics with Flume and HBase
Sematext Group, Inc. • il y a 12 ans
10 things we're doing wrong with SIEM
wremes • il y a 12 ans
How to Architect a Novell Sentinel Implementation
Novell • il y a 12 ans
Log Standards & Future Trends by Dr. Anton Chuvakin
Anton Chuvakin • il y a 12 ans
Log Data Mining
Anton Chuvakin • il y a 13 ans
Baselining Logs
Anton Chuvakin • il y a 14 ans
How to Develop Content Using the Novell Sentinel Software Development Kit
Novell • il y a 12 ans
Active Insight - Event Stream Processing In The Cloud
Mike Telem • il y a 13 ans
Making Log Data Useful: SIEM and Log Management Together
Anton Chuvakin • il y a 12 ans
PCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
Anton Chuvakin • il y a 12 ans
Spirit of PCI DSS by Dr. Anton Chuvakin
Anton Chuvakin • il y a 12 ans
IANS Navigating the Data Stream without Boiling the Ocean: Case Studies in Effective Log Management by Dr. Anton Chuvakin
Anton Chuvakin • il y a 12 ans
Enterprise Logging and Log Management: Hot Topics by Dr. Anton Chuvakin
Anton Chuvakin • il y a 12 ans
Evangelizing Yourself
Whitney Hess • il y a 13 ans
Credit Card Processing for Small Business
Mark Ginnebaugh • il y a 13 ans
Enterprise Cloud Risk And Security
Mark Masterson • il y a 13 ans
2009_06_08 The Lean Startup Tokyo edition
Eric Ries • il y a 13 ans
22 Smart, Inspirational Quotes From Bloggers In 2008
Adam Singer • il y a 13 ans
Next Generation Security Event Management (SEM) with Complex Event Processing (CEP)
Tim Bass • il y a 14 ans
"Grand Challenges" of Log Management
Anton Chuvakin • il y a 14 ans
Volha Chuvakin Ph.D. Defense Presentation "Some Aspects of Internet Portal Market Competition"
volha_chuvakin • il y a 15 ans
Log Mining: Beyond Log Analysis
Anton Chuvakin • il y a 15 ans
Intrusion Alert Correlation
amiable_indian • il y a 15 ans
Personal Information
Entreprise/Lieu de travail
San Francisco Bay Area, CA United States
Profession
Security Strategy
Site Web
www.chuvakin.org
À propos
Dr. Anton Chuvakin is now involved with security solution strategy at Google Cloud, where he arrived via Chronicle Security (an Alphabet company) acquisition in July 2019. Anton was, until recently, a Research Vice President and Distinguished Analyst at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team. Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. He is an author of books "Security Warrior", "Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management" and others
Coordonnées
Mots-clés
chuvakin security logs logging log management log management siem pci compliance sim sem pci dss cybersecurity incident response analysis security management monitoring soc database forensics information security dss virtualization incident response trends security operations keynote incident handling strategy myths application web proxy ediscovery threat internal insiders loglogic accountability sans threat detection 2020 security analytics log analysis pci compliance standards linux honeynet correlation infosec qualys 2005 metrics baselining anton chuvakin detection and response cloud security cloud-native threats detection cloud computing cloud analytics 2016 log mana security aman u.s. securities and exchange commission security mana log ma data breaches inc worst practices best practices predictions future class williams pci dss myths 2010 why are they still alive by dr log review mistakes log managent honeypots ids intrusion detection cee covert channels malware honeypot compromise discovery regulations chuvakin vulnerability management mining handling
Tout plus

Modal header

  • À propos
  • Assistance clientèle
  • Conditions générales
  • Confidentialité
  • Droits d’auteur
  • Préférences en matière de cookies
  • Ne pas vendre ou partager mes informations personnelles
Français
English
Español
Português
Langue courante: Français
Deutsch

© 2023 SlideShare from Scribd

Nous avons mis à jour notre politique de confidentialité.

Nous avons mis à jour notre politique de confidentialité pour nous conformer à l'évolution des réglementations mondiales en matière de confidentialité et pour vous informer de la manière dont nous utilisons vos données de façon limitée.

Vous pouvez consulter les détails ci-dessous. En cliquant sur Accepter, vous acceptez la politique de confidentialité mise à jour.

Merci!

Afficher la politique de confidentialité mise à jour
Nous avons rencontré un problème, veuillez réessayer.