Personal Information
Entreprise/Lieu de travail
San Francisco Bay Area, CA United States
Profession
Security Strategy
Site Web
www.chuvakin.org
À propos
Dr. Anton Chuvakin is now involved with security solution strategy at Google Cloud, where he arrived via Chronicle Security (an Alphabet company) acquisition in July 2019.
Anton was, until recently, a Research Vice President and Distinguished Analyst at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team.
Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. He is an author of books "Security Warrior", "Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management" and others
Mots-clés
chuvakin
security
logs
logging
log
management
log management
siem
cybersecurity
pci
compliance
sim
sem
pci dss
soc
security operations
incident response
analysis
security management
monitoring
database
forensics
secops
information security
dss
virtualization
incident
response
trends
anton chuvakin
threat detection
keynote
incident handling
strategy
myths
application
web
proxy
ediscovery
threat
internal
insiders
loglogic
accountability
modern soc
sans
detection and response
cloud security
2020
security analytics
log analysis
pci compliance
standards
linux
honeynet
correlation
infosec
qualys
2005
metrics
baselining
security automation
future of security
google cloud
security log management
cloud-native
threats
detection
cloud computing
cloud
analytics
2016
log mana
security aman
u.s. securities and exchange commission
security mana
log ma
data breaches
inc
worst practices
best practices
predictions
future
class
williams
pci dss myths 2010 why are they still alive by dr
log review
mistakes
log managent
honeypots
ids
intrusion detection
cee
covert channels
malware
honeypot
compromise discovery
regulations
chuvakin vulnerability management
mining
handling
Tout plus
Présentations
(86)Documents
(29)J’aime
(171)20 Years of SIEM - SANS Webinar 2022
Anton Chuvakin
•
il y a 2 ans
SOC Lessons from DevOps and SRE by Anton Chuvakin
Anton Chuvakin
•
il y a 1 an
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Anton Chuvakin
•
il y a 1 an
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Anton Chuvakin
•
il y a 12 ans
Breaking The Cloud Kill Chain
Puma Security, LLC
•
il y a 1 an
Alert Fidelity Measuring Detection Quality - march2019
Martin Potgieter
•
il y a 2 ans
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin
•
il y a 2 ans
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin
•
il y a 2 ans
DevSecOps: Key Controls to Modern Security Success
Puma Security, LLC
•
il y a 5 ans
50 Shades of Sigma
Florian Roth
•
il y a 3 ans
13 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy
•
il y a 3 ans
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; Keith McCammon, Red Canary
MITRE - ATT&CKcon
•
il y a 4 ans
Измерение эффективности SOC. 3 года спустя
Aleksey Lukatskiy
•
il y a 4 ans
Finding attacks with these 6 events
Michael Gough
•
il y a 8 ans
Deeplook into apt and how to detect and defend v1.0
Michael Gough
•
il y a 8 ans
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Joe Slowik
•
il y a 6 ans
Airbnb - StreamAlert
Amazon Web Services
•
il y a 5 ans
SplunkLive Brisbane Splunking the Endpoint
Splunk
•
il y a 7 ans
Security Analyst Workshop - 20190314
Florian Roth
•
il y a 5 ans
The Four Types of Threat Detection and Use Cases in Industrial Security
Dragos, Inc.
•
il y a 5 ans
5 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy
•
il y a 5 ans
SACON - Enterprise Security Architecture (Bikash Barai)
Priyanka Aash
•
il y a 6 ans
Машинное обучение в кибербезопасности
Aleksey Lukatskiy
•
il y a 5 ans
EDR vs SIEM - The fight is on
Justin Henderson
•
il y a 6 ans
TOGAF 9 - Security Architecture Ver1 0
Maganathin Veeraragaloo
•
il y a 13 ans
Security architecture
Duncan Unwin
•
il y a 11 ans
Incident Response Triage
Albert Hui
•
il y a 12 ans
The Art and Science of Alert Triage
Sqrrl
•
il y a 8 ans
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Raffael Marty
•
il y a 7 ans
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
•
il y a 6 ans
Personal Information
Entreprise/Lieu de travail
San Francisco Bay Area, CA United States
Profession
Security Strategy
Site Web
www.chuvakin.org
À propos
Dr. Anton Chuvakin is now involved with security solution strategy at Google Cloud, where he arrived via Chronicle Security (an Alphabet company) acquisition in July 2019.
Anton was, until recently, a Research Vice President and Distinguished Analyst at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team.
Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. He is an author of books "Security Warrior", "Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management" and others
Mots-clés
chuvakin
security
logs
logging
log
management
log management
siem
cybersecurity
pci
compliance
sim
sem
pci dss
soc
security operations
incident response
analysis
security management
monitoring
database
forensics
secops
information security
dss
virtualization
incident
response
trends
anton chuvakin
threat detection
keynote
incident handling
strategy
myths
application
web
proxy
ediscovery
threat
internal
insiders
loglogic
accountability
modern soc
sans
detection and response
cloud security
2020
security analytics
log analysis
pci compliance
standards
linux
honeynet
correlation
infosec
qualys
2005
metrics
baselining
security automation
future of security
google cloud
security log management
cloud-native
threats
detection
cloud computing
cloud
analytics
2016
log mana
security aman
u.s. securities and exchange commission
security mana
log ma
data breaches
inc
worst practices
best practices
predictions
future
class
williams
pci dss myths 2010 why are they still alive by dr
log review
mistakes
log managent
honeypots
ids
intrusion detection
cee
covert channels
malware
honeypot
compromise discovery
regulations
chuvakin vulnerability management
mining
handling
Tout plus