Soumettre la recherche
Mettre en ligne
1st Russian CSO Summit Trends 2008
•
4 j'aime
•
1,090 vues
Anton Chuvakin
Suivre
1st Russian CSO Summit Trends 2008
Lire moins
Lire la suite
Technologie
Signaler
Partager
Signaler
Partager
1 sur 22
Recommandé
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
Isaiah Edem
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
IT Security
IT Security
Raden Tjokro Partono
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
The Current State of Cybersecurity
The Current State of Cybersecurity
TruShield Security Solutions
Beyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
Segun Ebenezer Olaniyan
Recommandé
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
Isaiah Edem
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
IT Security
IT Security
Raden Tjokro Partono
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
The Current State of Cybersecurity
The Current State of Cybersecurity
TruShield Security Solutions
Beyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
Segun Ebenezer Olaniyan
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
Digital citizenship presentation
Digital citizenship presentation
Casey McDaniel
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
Five things I learned about information security
Five things I learned about information security
Major Hayden
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Stephen Abram
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
PECB
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
PECB
The Thing That Should Not Be
The Thing That Should Not Be
morisson
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Joshua Berman
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Priyanka Aash
Cybersecurity
Cybersecurity
ANGIEPAEZ304
The view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
IDERA Software
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
PacSecJP
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
PECB
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Anton Chuvakin
Current Emerging Threats
Current Emerging Threats
dnomura
Contenu connexe
Tendances
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
Digital citizenship presentation
Digital citizenship presentation
Casey McDaniel
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
Five things I learned about information security
Five things I learned about information security
Major Hayden
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Stephen Abram
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
PECB
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
PECB
The Thing That Should Not Be
The Thing That Should Not Be
morisson
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Joshua Berman
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Priyanka Aash
Cybersecurity
Cybersecurity
ANGIEPAEZ304
The view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
IDERA Software
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
PacSecJP
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
PECB
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
Tendances
(20)
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Digital citizenship presentation
Digital citizenship presentation
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Five things I learned about information security
Five things I learned about information security
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
The Thing That Should Not Be
The Thing That Should Not Be
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Cybersecurity
Cybersecurity
The view of auditor on cybercrime
The view of auditor on cybercrime
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
Similaire à 1st Russian CSO Summit Trends 2008
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Anton Chuvakin
Current Emerging Threats
Current Emerging Threats
dnomura
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana iisf...
Eoin Keary
Module0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
Jorge Orchilles
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
Keith Redman
Cyber security for Developers
Cyber security for Developers
techtutorus
The difference between a duck
The difference between a duck
SensePost
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
Security
Security
Bob Cherry
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
joshquarrie
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
kbzdox ivanovich
We cant hack ourselves secure
We cant hack ourselves secure
Eoin Keary
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
PCM
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
Matthew Pascucci
E security and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
Ben Johnson
Similaire à 1st Russian CSO Summit Trends 2008
(20)
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Current Emerging Threats
Current Emerging Threats
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana iisf...
Module0&1 intro-foundations-b
Module0&1 intro-foundations-b
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
Cyber security for Developers
Cyber security for Developers
The difference between a duck
The difference between a duck
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Security
Security
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
We cant hack ourselves secure
We cant hack ourselves secure
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
E security and payment 2013-1
E security and payment 2013-1
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
Plus de Anton Chuvakin
Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
Anton Chuvakin
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Anton Chuvakin
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin
Modern SOC Trends 2020
Modern SOC Trends 2020
Anton Chuvakin
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton Chuvakin
Generic siem how_2017
Generic siem how_2017
Anton Chuvakin
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
Anton Chuvakin
Five SIEM Futures (2012)
Five SIEM Futures (2012)
Anton Chuvakin
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Anton Chuvakin
SIEM Primer:
SIEM Primer:
Anton Chuvakin
Plus de Anton Chuvakin
(20)
Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
Modern SOC Trends 2020
Modern SOC Trends 2020
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
Generic siem how_2017
Generic siem how_2017
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
Five SIEM Futures (2012)
Five SIEM Futures (2012)
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
SIEM Primer:
SIEM Primer:
Dernier
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
gurkirankumar98700
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Dernier
(20)
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Slack Application Development 101 Slides
Slack Application Development 101 Slides
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
1st Russian CSO Summit Trends 2008
1.
Security Trends and
Predictions 2008 Dr Anton Chuvakin Chief Logging Evangelist LogLogic, Inc Mitigating Risk. Automating Compliance. CSO Summit Moscow, March 24-25, 2008
2.
3.
4.
Key theme: Compliance
and Security Why do you wear seat belts for fear of $50 fine, but do not wear them out of fear for your life?
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
Thank You Q
& A СПАСИБО ЗА ВНИМАНИЕ
Notes de l'éditeur
Предсказания и тенденции по безопасности