Submit Search
Upload
1st Russian CSO Summit Trends 2008
•
4 likes
•
1,090 views
Anton Chuvakin
Follow
1st Russian CSO Summit Trends 2008
Read less
Read more
Technology
Report
Share
Report
Share
1 of 22
Recommended
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
Isaiah Edem
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
IT Security
IT Security
Raden Tjokro Partono
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
The Current State of Cybersecurity
The Current State of Cybersecurity
TruShield Security Solutions
Beyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
Segun Ebenezer Olaniyan
Recommended
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
Isaiah Edem
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
IT Security
IT Security
Raden Tjokro Partono
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
The Current State of Cybersecurity
The Current State of Cybersecurity
TruShield Security Solutions
Beyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
Segun Ebenezer Olaniyan
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
Digital citizenship presentation
Digital citizenship presentation
Casey McDaniel
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
Five things I learned about information security
Five things I learned about information security
Major Hayden
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Stephen Abram
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
PECB
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
PECB
The Thing That Should Not Be
The Thing That Should Not Be
morisson
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Joshua Berman
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Priyanka Aash
Cybersecurity
Cybersecurity
ANGIEPAEZ304
The view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
IDERA Software
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
PacSecJP
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
PECB
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Anton Chuvakin
Current Emerging Threats
Current Emerging Threats
dnomura
More Related Content
What's hot
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
Digital citizenship presentation
Digital citizenship presentation
Casey McDaniel
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
Five things I learned about information security
Five things I learned about information security
Major Hayden
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Stephen Abram
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
PECB
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
PECB
The Thing That Should Not Be
The Thing That Should Not Be
morisson
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Joshua Berman
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Priyanka Aash
Cybersecurity
Cybersecurity
ANGIEPAEZ304
The view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
IDERA Software
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
PacSecJP
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
PECB
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
What's hot
(20)
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Digital citizenship presentation
Digital citizenship presentation
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Five things I learned about information security
Five things I learned about information security
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
The Thing That Should Not Be
The Thing That Should Not Be
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Cybersecurity
Cybersecurity
The view of auditor on cybercrime
The view of auditor on cybercrime
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
Similar to 1st Russian CSO Summit Trends 2008
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Anton Chuvakin
Current Emerging Threats
Current Emerging Threats
dnomura
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana iisf...
Eoin Keary
Module0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
Jorge Orchilles
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
Keith Redman
Cyber security for Developers
Cyber security for Developers
techtutorus
The difference between a duck
The difference between a duck
SensePost
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
Security
Security
Bob Cherry
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
joshquarrie
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
kbzdox ivanovich
We cant hack ourselves secure
We cant hack ourselves secure
Eoin Keary
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
PCM
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
Matthew Pascucci
E security and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
Ben Johnson
Similar to 1st Russian CSO Summit Trends 2008
(20)
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Current Emerging Threats
Current Emerging Threats
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana iisf...
Module0&1 intro-foundations-b
Module0&1 intro-foundations-b
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
Cyber security for Developers
Cyber security for Developers
The difference between a duck
The difference between a duck
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Security
Security
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
We cant hack ourselves secure
We cant hack ourselves secure
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
E security and payment 2013-1
E security and payment 2013-1
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
More from Anton Chuvakin
Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
Anton Chuvakin
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Anton Chuvakin
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin
Modern SOC Trends 2020
Modern SOC Trends 2020
Anton Chuvakin
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton Chuvakin
Generic siem how_2017
Generic siem how_2017
Anton Chuvakin
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
Anton Chuvakin
Five SIEM Futures (2012)
Five SIEM Futures (2012)
Anton Chuvakin
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Anton Chuvakin
SIEM Primer:
SIEM Primer:
Anton Chuvakin
More from Anton Chuvakin
(20)
Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
Modern SOC Trends 2020
Modern SOC Trends 2020
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
Generic siem how_2017
Generic siem how_2017
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
Five SIEM Futures (2012)
Five SIEM Futures (2012)
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
SIEM Primer:
SIEM Primer:
Recently uploaded
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
Kumar Satyam
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
johnbeverley2021
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
Christopher Logan Kennedy
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Jago de Vreede
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard37
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
danishmna97
Recently uploaded
(20)
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
1st Russian CSO Summit Trends 2008
1.
Security Trends and
Predictions 2008 Dr Anton Chuvakin Chief Logging Evangelist LogLogic, Inc Mitigating Risk. Automating Compliance. CSO Summit Moscow, March 24-25, 2008
2.
3.
4.
Key theme: Compliance
and Security Why do you wear seat belts for fear of $50 fine, but do not wear them out of fear for your life?
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
Thank You Q
& A СПАСИБО ЗА ВНИМАНИЕ
Editor's Notes
Предсказания и тенденции по безопасности