Tags
chuvakin
security
logs
logging
log
management
log management
siem
pci
compliance
sim
sem
pci dss
cybersecurity
incident response
analysis
security management
monitoring
soc
database
forensics
information security
dss
virtualization
incident
response
trends
security operations
keynote
incident handling
strategy
myths
application
web
proxy
ediscovery
threat
internal
insiders
loglogic
accountability
sans
threat detection
2020
security analytics
log analysis
pci compliance
standards
linux
honeynet
correlation
infosec
qualys
2005
metrics
baselining
anton chuvakin
detection and response
cloud security
cloud-native
threats
detection
cloud computing
cloud
analytics
2016
log mana
security aman
u.s. securities and exchange commission
security mana
log ma
data breaches
inc
worst practices
best practices
predictions
future
class
williams
pci dss myths 2010 why are they still alive by dr
log review
mistakes
log managent
honeypots
ids
intrusion detection
cee
covert channels
malware
honeypot
compromise discovery
regulations
chuvakin vulnerability management
mining
handling
See more
Presentations
(80)
See all
Documents
(29)
See all
Likes
(167)
See all
Breaking The Cloud Kill Chain
Puma Security, LLC
•
1 month ago
Alert Fidelity Measuring Detection Quality - march2019
Martin Potgieter
•
1 year ago
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin
•
1 year ago
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin
•
1 year ago
DevSecOps: Key Controls to Modern Security Success
Puma Security, LLC
•
3 years ago
50 Shades of Sigma
Florian Roth
•
2 years ago
13 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy
•
2 years ago
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; Keith McCammon, Red Canary
MITRE - ATT&CKcon
•
3 years ago
Измерение эффективности SOC. 3 года спустя
Aleksey Lukatskiy
•
3 years ago
Finding attacks with these 6 events
Michael Gough
•
6 years ago
Deeplook into apt and how to detect and defend v1.0
Michael Gough
•
7 years ago
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Joe Slowik
•
4 years ago
Airbnb - StreamAlert
Amazon Web Services
•
4 years ago
SplunkLive Brisbane Splunking the Endpoint
Splunk
•
6 years ago
Security Analyst Workshop - 20190314
Florian Roth
•
3 years ago
The Four Types of Threat Detection and Use Cases in Industrial Security
Dragos, Inc.
•
4 years ago
5 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy
•
3 years ago
SACON - Enterprise Security Architecture (Bikash Barai)
Priyanka Aash
•
5 years ago
Машинное обучение в кибербезопасности
Aleksey Lukatskiy
•
4 years ago
EDR vs SIEM - The fight is on
Justin Henderson
•
5 years ago
TOGAF 9 - Security Architecture Ver1 0
Maganathin Veeraragaloo
•
12 years ago
Security architecture
Duncan Unwin
•
10 years ago
Incident Response Triage
Albert Hui
•
11 years ago
The Art and Science of Alert Triage
Sqrrl
•
7 years ago
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Raffael Marty
•
6 years ago
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
•
5 years ago
Adversarial Simulation Nickerson/Gates Wild West Hacking Fest Oct 2017
Chris Gates
•
5 years ago
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Chris Nickerson
Chris Gates
•
6 years ago
Ландшафт технологий кибербезопасности 2025
Aleksey Lukatskiy
•
5 years ago
SOC vs SIEM
Aleksey Lukatskiy
•
5 years ago
Presentations
(80)
See all
Documents
(29)
See all
Likes
(167)
See all
Breaking The Cloud Kill Chain
Puma Security, LLC
•
1 month ago
Alert Fidelity Measuring Detection Quality - march2019
Martin Potgieter
•
1 year ago
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin
•
1 year ago
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin
•
1 year ago
DevSecOps: Key Controls to Modern Security Success
Puma Security, LLC
•
3 years ago
50 Shades of Sigma
Florian Roth
•
2 years ago
13 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy
•
2 years ago
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; Keith McCammon, Red Canary
MITRE - ATT&CKcon
•
3 years ago
Измерение эффективности SOC. 3 года спустя
Aleksey Lukatskiy
•
3 years ago
Finding attacks with these 6 events
Michael Gough
•
6 years ago
Deeplook into apt and how to detect and defend v1.0
Michael Gough
•
7 years ago
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Joe Slowik
•
4 years ago
Airbnb - StreamAlert
Amazon Web Services
•
4 years ago
SplunkLive Brisbane Splunking the Endpoint
Splunk
•
6 years ago
Security Analyst Workshop - 20190314
Florian Roth
•
3 years ago
The Four Types of Threat Detection and Use Cases in Industrial Security
Dragos, Inc.
•
4 years ago
5 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy
•
3 years ago
SACON - Enterprise Security Architecture (Bikash Barai)
Priyanka Aash
•
5 years ago
Машинное обучение в кибербезопасности
Aleksey Lukatskiy
•
4 years ago
EDR vs SIEM - The fight is on
Justin Henderson
•
5 years ago
TOGAF 9 - Security Architecture Ver1 0
Maganathin Veeraragaloo
•
12 years ago
Security architecture
Duncan Unwin
•
10 years ago
Incident Response Triage
Albert Hui
•
11 years ago
The Art and Science of Alert Triage
Sqrrl
•
7 years ago
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Raffael Marty
•
6 years ago
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty
•
5 years ago
Adversarial Simulation Nickerson/Gates Wild West Hacking Fest Oct 2017
Chris Gates
•
5 years ago
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Chris Nickerson
Chris Gates
•
6 years ago
Ландшафт технологий кибербезопасности 2025
Aleksey Lukatskiy
•
5 years ago
SOC vs SIEM
Aleksey Lukatskiy
•
5 years ago
Tags
chuvakin
security
logs
logging
log
management
log management
siem
pci
compliance
sim
sem
pci dss
cybersecurity
incident response
analysis
security management
monitoring
soc
database
forensics
information security
dss
virtualization
incident
response
trends
security operations
keynote
incident handling
strategy
myths
application
web
proxy
ediscovery
threat
internal
insiders
loglogic
accountability
sans
threat detection
2020
security analytics
log analysis
pci compliance
standards
linux
honeynet
correlation
infosec
qualys
2005
metrics
baselining
anton chuvakin
detection and response
cloud security
cloud-native
threats
detection
cloud computing
cloud
analytics
2016
log mana
security aman
u.s. securities and exchange commission
security mana
log ma
data breaches
inc
worst practices
best practices
predictions
future
class
williams
pci dss myths 2010 why are they still alive by dr
log review
mistakes
log managent
honeypots
ids
intrusion detection
cee
covert channels
malware
honeypot
compromise discovery
regulations
chuvakin vulnerability management
mining
handling
See more