Log Forensics from CEIC 2007

Security Strategy
May. 15, 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
Log Forensics from CEIC 2007
1 of 16

More Related Content

Viewers also liked

Business setup services dubaiBusiness setup services dubai
Business setup services dubaidaralmazayadxb
高齢者孤独死防止アプリ高齢者孤独死防止アプリ
高齢者孤独死防止アプリsasaki-ryo
Marges et organisation : une approche critique et politique au regard du genreMarges et organisation : une approche critique et politique au regard du genre
Marges et organisation : une approche critique et politique au regard du genreVirginie Martin
APS Presentation2015APS Presentation2015
APS Presentation2015Sarah Adamson Grimmer
ResumeResume
ResumeYusuf Shaikh
5 Secrets To Improve ITSM Profitability5 Secrets To Improve ITSM Profitability
5 Secrets To Improve ITSM ProfitabilityMarc Gourvenec

Similar to Log Forensics from CEIC 2007

Using Logs for Breach Investigations and Incident Response by Dr Anton ChuvakinUsing Logs for Breach Investigations and Incident Response by Dr Anton Chuvakin
Using Logs for Breach Investigations and Incident Response by Dr Anton ChuvakinAnton Chuvakin
Logs for Incident Response and Forensics: Key Issues for GOVCERT.NL 2008Logs for Incident Response and Forensics: Key Issues for GOVCERT.NL 2008
Logs for Incident Response and Forensics: Key Issues for GOVCERT.NL 2008Anton Chuvakin
Logs for Information Assurance and Forensics @ USMALogs for Information Assurance and Forensics @ USMA
Logs for Information Assurance and Forensics @ USMAAnton Chuvakin
Six Mistakes of Log Management 2008Six Mistakes of Log Management 2008
Six Mistakes of Log Management 2008Anton Chuvakin
Power of logs: practices for network securityPower of logs: practices for network security
Power of logs: practices for network securityInformation Technology Society Nepal
CSI NetSec 2007 Six MIstakes of Log Management by Anton ChuvakinCSI NetSec 2007 Six MIstakes of Log Management by Anton Chuvakin
CSI NetSec 2007 Six MIstakes of Log Management by Anton ChuvakinAnton Chuvakin

Similar to Log Forensics from CEIC 2007(20)

More from Anton Chuvakin

SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinAnton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothAnton Chuvakin
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton ChuvakinAnton Chuvakin
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC TrendsAnton Chuvakin

More from Anton Chuvakin(20)

Recently uploaded

IMD World Talent Report 2023.pdfIMD World Talent Report 2023.pdf
IMD World Talent Report 2023.pdfPaperjam_redaction
Marv Wexler - Transform Your with AI.pdfMarv Wexler - Transform Your with AI.pdf
Marv Wexler - Transform Your with AI.pdfSOLTUIONSpeople, THINKubators, THINKathons
The CMO Survey - Highlights and Insights Report - Fall 2023The CMO Survey - Highlights and Insights Report - Fall 2023
The CMO Survey - Highlights and Insights Report - Fall 2023christinemoorman
Online Giving Trends (3).pdfOnline Giving Trends (3).pdf
Online Giving Trends (3).pdfBloomerang
Biotech Fundraising in a DownturnBiotech Fundraising in a Downturn
Biotech Fundraising in a DownturnVolker Hirsch
goodmakerU & Bloomerang Webinar _The Keys to a record breaking Year-End Fundr...goodmakerU & Bloomerang Webinar _The Keys to a record breaking Year-End Fundr...
goodmakerU & Bloomerang Webinar _The Keys to a record breaking Year-End Fundr...Bloomerang

Log Forensics from CEIC 2007

Editor's Notes

  1. Integrating Log Analysis into Your Incident Response Practice Monday May 7 — General Lab 1 7:30 a.m. - 9:00 a.m. Presented By Anton Chuvakin Log management and log analysis plays a key role in the area of incident response. As the complexity and frequency of investigations climb so does the understand of how to use logs to quickly diagnose an incident and narrow the scope of an investigation . With the proper procedures, logging settings, and analytical tools an organization can use logs to dramatically increase the productivity and effectiveness of their incident response process. Using hand on examples this lab will show the importance of logs and the specific situation in which they can be used , how they can be used and what their limitation are.