Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

    SlideShare
  • Slideshare-64x64 Home
  • Explore
  • Search
    • You
  • Upload
  • Login
  • Signup
  • Home
  • Explore
×
×
×
×
×
×

Anton Chuvakin

Anton Chuvakin
  • Following Follow   Processing…
  • 113 SlideShares
  • 551 Followers
  • 1 Clipboard

Modal header

One fine body…

    • San Francisco Bay Area, CA, United States
  • Work Security Strategy
  • Website www.chuvakin.org
  • About Dr. Anton Chuvakin is now involved with security solution strategy at Google Cloud, where he arrived via Chronicle Security (an Alphabet company) acquisition in July 2019. Anton was, until recently, a Research Vice President and Distinguished Analyst at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team. Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. He is an author of books "Security Warrior", "Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management" and others
TwitterLinkedIn
Followers (551)
  • El Mehdi EL JAIR
  • daudaladumy
  • Aleksey Lukatskiy
  • HarpreetSinghArora7
  • Timur Baitenov
  • Nesrin Aslan
Following (621)
  • MITRE - ATT&CKcon
  • Michael Gough
  • Florian Roth
  • Justin Henderson
  • Florian Roth

View all Likes (177)

  • DevSecOps: Key Controls to Modern Security Success DevSecOps: Key Controls to Mo... by pumasecurity 2 years ago
  • 50 Shades of Sigma 50 Shades of Sigma by FlorianRoth2 4 months ago
  • 13 советов, от которых зависит успешность вашего SOC 13 советов, от которых зависи... by lukatsky 7 months ago
  • MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; Keith McCammon, Red Canary MITRE ATT&CKcon 2.0: Prioriti... by attackcon2018 1 year ago
  • Измерение эффективности SOC. 3 года спустя Измерение эффективности SOC. ... by lukatsky 1 year ago
  • Finding attacks with these 6 events Finding attacks with these 6 ... by Hackerhurr... 4 years ago
  • Deeplook into apt and how to detect and defend v1.0 Deeplook into apt and how to ... by Hackerhurr... 5 years ago
  • Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups Aligning Threat Intelligence ... by JoeSlowik 2 years ago
  • English
  • Español
  • Português
  • Français
  • Deutsch
  • About
  • Developers & API
  • Blog
  • Terms
  • Privacy
  • Copyright
  • Support
RSS Feeds