Submit Search
Upload
1st Russian CSO Summit Trends 2008
•
4 likes
•
1,090 views
Anton Chuvakin
Follow
1st Russian CSO Summit Trends 2008
Read less
Read more
Technology
Report
Share
Report
Share
1 of 22
Recommended
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
Isaiah Edem
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
IT Security
IT Security
Raden Tjokro Partono
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
The Current State of Cybersecurity
The Current State of Cybersecurity
TruShield Security Solutions
Beyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
Segun Ebenezer Olaniyan
Recommended
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
Isaiah Edem
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
IT Security
IT Security
Raden Tjokro Partono
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
The Current State of Cybersecurity
The Current State of Cybersecurity
TruShield Security Solutions
Beyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
Segun Ebenezer Olaniyan
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
Digital citizenship presentation
Digital citizenship presentation
Casey McDaniel
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
Five things I learned about information security
Five things I learned about information security
Major Hayden
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Stephen Abram
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
PECB
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
PECB
The Thing That Should Not Be
The Thing That Should Not Be
morisson
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Joshua Berman
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Priyanka Aash
Cybersecurity
Cybersecurity
ANGIEPAEZ304
The view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
IDERA Software
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
PacSecJP
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
PECB
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Anton Chuvakin
Current Emerging Threats
Current Emerging Threats
dnomura
More Related Content
What's hot
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
Digital citizenship presentation
Digital citizenship presentation
Casey McDaniel
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
Five things I learned about information security
Five things I learned about information security
Major Hayden
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Stephen Abram
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
PECB
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
PECB
The Thing That Should Not Be
The Thing That Should Not Be
morisson
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Joshua Berman
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Priyanka Aash
Cybersecurity
Cybersecurity
ANGIEPAEZ304
The view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
IDERA Software
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
PacSecJP
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
PECB
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
What's hot
(20)
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Digital citizenship presentation
Digital citizenship presentation
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Five things I learned about information security
Five things I learned about information security
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
The Thing That Should Not Be
The Thing That Should Not Be
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Cybersecurity
Cybersecurity
The view of auditor on cybercrime
The view of auditor on cybercrime
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
Similar to 1st Russian CSO Summit Trends 2008
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Anton Chuvakin
Current Emerging Threats
Current Emerging Threats
dnomura
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana iisf...
Eoin Keary
Module0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
Jorge Orchilles
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
Keith Redman
Cyber security for Developers
Cyber security for Developers
techtutorus
The difference between a duck
The difference between a duck
SensePost
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
Security
Security
Bob Cherry
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
joshquarrie
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
kbzdox ivanovich
We cant hack ourselves secure
We cant hack ourselves secure
Eoin Keary
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
PCM
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
Matthew Pascucci
E security and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
Ben Johnson
Similar to 1st Russian CSO Summit Trends 2008
(20)
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Current Emerging Threats
Current Emerging Threats
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana iisf...
Module0&1 intro-foundations-b
Module0&1 intro-foundations-b
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
Cyber security for Developers
Cyber security for Developers
The difference between a duck
The difference between a duck
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Security
Security
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
We cant hack ourselves secure
We cant hack ourselves secure
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
E security and payment 2013-1
E security and payment 2013-1
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
More from Anton Chuvakin
Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
Anton Chuvakin
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Anton Chuvakin
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin
Modern SOC Trends 2020
Modern SOC Trends 2020
Anton Chuvakin
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton Chuvakin
Generic siem how_2017
Generic siem how_2017
Anton Chuvakin
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
Anton Chuvakin
Five SIEM Futures (2012)
Five SIEM Futures (2012)
Anton Chuvakin
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Anton Chuvakin
SIEM Primer:
SIEM Primer:
Anton Chuvakin
More from Anton Chuvakin
(20)
Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
Modern SOC Trends 2020
Modern SOC Trends 2020
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
Generic siem how_2017
Generic siem how_2017
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
Five SIEM Futures (2012)
Five SIEM Futures (2012)
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
SIEM Primer:
SIEM Primer:
Recently uploaded
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
charlottematthew16
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
2toLead Limited
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
Zilliz
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
Lorenzo Miniero
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Mark Simos
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
charlottematthew16
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
Zilliz
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Manik S Magar
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
Miki Katsuragi
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
Recently uploaded
(20)
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Training state-of-the-art general text embedding
Training state-of-the-art general text embedding
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
1st Russian CSO Summit Trends 2008
1.
Security Trends and
Predictions 2008 Dr Anton Chuvakin Chief Logging Evangelist LogLogic, Inc Mitigating Risk. Automating Compliance. CSO Summit Moscow, March 24-25, 2008
2.
3.
4.
Key theme: Compliance
and Security Why do you wear seat belts for fear of $50 fine, but do not wear them out of fear for your life?
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
Thank You Q
& A СПАСИБО ЗА ВНИМАНИЕ
Editor's Notes
Предсказания и тенденции по безопасности