SlideShare a Scribd company logo
  • Upload
  • Home
  • Explore
  • Login
  • Signup
SlideShare a Scribd company logo
  • Home
  • Explore
  • Upload
  • Login
  • Signup

We've updated our privacy policy. Click here to review the details. Tap here to review the details.

×
×
×
×
×
×
Anton Chuvakin

Anton Chuvakin

558 Followers
109 SlideShares 1 Clipboard 558 Followers 619 Followings
  • Unblock User Block User
109 SlideShares 1 Clipboard 558 Followers 619 Followings

Personal Information
Contact Details
Tags
chuvakin security logs logging log management log management siem pci compliance sim sem pci dss cybersecurity incident response analysis security management monitoring soc database forensics information security dss virtualization incident response trends security operations keynote incident handling strategy myths application web proxy ediscovery threat internal insiders loglogic accountability sans threat detection 2020 security analytics log analysis pci compliance standards linux honeynet correlation infosec qualys 2005 metrics baselining anton chuvakin detection and response cloud security cloud-native threats detection cloud computing cloud analytics 2016 log mana security aman u.s. securities and exchange commission security mana log ma data breaches inc worst practices best practices predictions future class williams pci dss myths 2010 why are they still alive by dr log review mistakes log managent honeypots ids intrusion detection cee covert channels malware honeypot compromise discovery regulations chuvakin vulnerability management mining handling
See more
Presentations (80)
See all
Anton Chuvakin on illogic Rootkit Analysis
16 years ago • 3422 Views
Anton Chuvakin on Honeypots
16 years ago • 1819 Views
Anton Chuvakin FTP Server Intrusion Investigation
16 years ago • 2647 Views
Anton Chuvakin on Discovering That Your Linux Box is Hacked
16 years ago • 2221 Views
Anton Chuvakin on Security Data Centralization
16 years ago • 1263 Views
Anton Chuvakin on What is NOT Working in Security 2004
16 years ago • 698 Views
Anton Chuvakin on Threat and Vulnerability Intelligence
16 years ago • 3643 Views
Six Mistakes of Log Management Teaser Preso
16 years ago • 731 Views
Log Forensics from CEIC 2007
15 years ago • 1174 Views
CONFidence 2007 Log Forensics TEASER Preso
15 years ago • 1357 Views
Interop 2007 Keynote Teaser
15 years ago • 690 Views
CSI NetSec 2007 Six MIstakes of Log Management by Anton Chuvakin
15 years ago • 2116 Views
Logs for Information Assurance and Forensics @ USMA
15 years ago • 1070 Views
Web Proxy Log Analysis and Management 2007
15 years ago • 36099 Views
Log Mining: Beyond Log Analysis
15 years ago • 20599 Views
NIST 800-92 Log Management Guide in the Real World
15 years ago • 8814 Views
Choosing Your Log Management Approach: Buy, Build or Outsource
15 years ago • 3765 Views
CEE Logging Standard: Today and Tomorrow
15 years ago • 2977 Views
1st Russian CSO Summit Trends 2008
14 years ago • 1086 Views
Six Mistakes of Log Management 2008
14 years ago • 2129 Views
Baselining Logs
14 years ago • 4305 Views
Security Management Trends 2004
14 years ago • 461 Views
Old Presentation on Security Metrics 2005
14 years ago • 1394 Views
What Every Organization Should Log And Monitor
14 years ago • 2226 Views
O'Reilly Webinar Five Mistakes Log Analysis
14 years ago • 981 Views
Logs for Incident Response and Forensics: Key Issues for GOVCERT.NL 2008
14 years ago • 2936 Views
Logs = Accountability
14 years ago • 3385 Views
Anton's Log Management 'Worst Practices'
14 years ago • 5128 Views
"Grand Challenges" of Log Management
14 years ago • 3319 Views
Early Look: Logging and Virtualization
14 years ago • 672 Views
Documents (29)
See all
"Compliance First" or "Security First"
13 years ago • 1370 Views
Myths of PCI DSS
13 years ago • 367 Views
Advanced Log Processing
13 years ago • 989 Views
Real-time fallacy: how real-time your security really is?
13 years ago • 455 Views
All Anton's Top11 Log Lists
13 years ago • 1605 Views
Log Analysis Across System Boundaries for Security, Compliance, and Operations
13 years ago • 408 Views
Log Data Mining
13 years ago • 8475 Views
Introduction to Database Log Analysis
13 years ago • 2602 Views
Where Logs Hide: Logs in Virtualized Environments
13 years ago • 273 Views
Five Mistakes of Vulnerability Management
13 years ago • 638 Views
Log Management in the Age of Compliance
13 years ago • 308 Views
Discovery of Compromised Machines
13 years ago • 841 Views
Computer Forensics in the Age of Compliance
13 years ago • 727 Views
Automated Incident Handling Using SIM
13 years ago • 691 Views
Days of the Honeynet: Attacks, Tools, Incidents
13 years ago • 522 Views
Chroot Protection and Breaking
13 years ago • 2880 Views
Covert Channels
13 years ago • 5275 Views
Security Event Analysis Through Correlation
13 years ago • 7139 Views
Take back your security infrastructure
13 years ago • 683 Views
Importance Of Structured Incident Response Process
13 years ago • 5899 Views
Audit logs for Security and Compliance
13 years ago • 4472 Views
Data hiding and finding on Linux
13 years ago • 2547 Views
Five IDS mistakes people make
13 years ago • 484 Views
Log Analysis Across System Boundaries for Security, Compliance, and Operations
13 years ago • 619 Views
Five Mistakes of Incident Response
13 years ago • 942 Views
Honeypot Essentials
13 years ago • 2424 Views
Logging "BrainBox" Short Article
13 years ago • 600 Views
What do I really need to do to STAY compliant with PCI DSS?
13 years ago • 717 Views
Log Management for PCI Compliance [OLD]
13 years ago • 1247 Views
Likes (167)
See all
Breaking The Cloud Kill Chain
Puma Security, LLC • 1 month ago
Alert Fidelity Measuring Detection Quality - march2019
Martin Potgieter • 1 year ago
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin • 1 year ago
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin • 1 year ago
DevSecOps: Key Controls to Modern Security Success
Puma Security, LLC • 3 years ago
50 Shades of Sigma
Florian Roth • 2 years ago
13 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy • 2 years ago
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; Keith McCammon, Red Canary
MITRE - ATT&CKcon • 3 years ago
Измерение эффективности SOC. 3 года спустя
Aleksey Lukatskiy • 3 years ago
Finding attacks with these 6 events
Michael Gough • 6 years ago
Deeplook into apt and how to detect and defend v1.0
Michael Gough • 7 years ago
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Joe Slowik • 4 years ago
Airbnb - StreamAlert
Amazon Web Services • 4 years ago
SplunkLive Brisbane Splunking the Endpoint
Splunk • 6 years ago
Security Analyst Workshop - 20190314
Florian Roth • 3 years ago
The Four Types of Threat Detection and Use Cases in Industrial Security
Dragos, Inc. • 4 years ago
5 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy • 3 years ago
SACON - Enterprise Security Architecture (Bikash Barai)
Priyanka Aash • 5 years ago
Машинное обучение в кибербезопасности
Aleksey Lukatskiy • 4 years ago
EDR vs SIEM - The fight is on
Justin Henderson • 5 years ago
TOGAF 9 - Security Architecture Ver1 0
Maganathin Veeraragaloo • 12 years ago
Security architecture
Duncan Unwin • 10 years ago
Incident Response Triage
Albert Hui • 11 years ago
The Art and Science of Alert Triage
Sqrrl • 7 years ago
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Raffael Marty • 6 years ago
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty • 5 years ago
Adversarial Simulation Nickerson/Gates Wild West Hacking Fest Oct 2017
Chris Gates • 5 years ago
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Chris Nickerson
Chris Gates • 6 years ago
Ландшафт технологий кибербезопасности 2025
Aleksey Lukatskiy • 5 years ago
SOC vs SIEM
Aleksey Lukatskiy • 5 years ago
  • Activity
  • About

Presentations (80)
See all
Anton Chuvakin on illogic Rootkit Analysis
16 years ago • 3422 Views
Anton Chuvakin on Honeypots
16 years ago • 1819 Views
Anton Chuvakin FTP Server Intrusion Investigation
16 years ago • 2647 Views
Anton Chuvakin on Discovering That Your Linux Box is Hacked
16 years ago • 2221 Views
Anton Chuvakin on Security Data Centralization
16 years ago • 1263 Views
Anton Chuvakin on What is NOT Working in Security 2004
16 years ago • 698 Views
Anton Chuvakin on Threat and Vulnerability Intelligence
16 years ago • 3643 Views
Six Mistakes of Log Management Teaser Preso
16 years ago • 731 Views
Log Forensics from CEIC 2007
15 years ago • 1174 Views
CONFidence 2007 Log Forensics TEASER Preso
15 years ago • 1357 Views
Interop 2007 Keynote Teaser
15 years ago • 690 Views
CSI NetSec 2007 Six MIstakes of Log Management by Anton Chuvakin
15 years ago • 2116 Views
Logs for Information Assurance and Forensics @ USMA
15 years ago • 1070 Views
Web Proxy Log Analysis and Management 2007
15 years ago • 36099 Views
Log Mining: Beyond Log Analysis
15 years ago • 20599 Views
NIST 800-92 Log Management Guide in the Real World
15 years ago • 8814 Views
Choosing Your Log Management Approach: Buy, Build or Outsource
15 years ago • 3765 Views
CEE Logging Standard: Today and Tomorrow
15 years ago • 2977 Views
1st Russian CSO Summit Trends 2008
14 years ago • 1086 Views
Six Mistakes of Log Management 2008
14 years ago • 2129 Views
Baselining Logs
14 years ago • 4305 Views
Security Management Trends 2004
14 years ago • 461 Views
Old Presentation on Security Metrics 2005
14 years ago • 1394 Views
What Every Organization Should Log And Monitor
14 years ago • 2226 Views
O'Reilly Webinar Five Mistakes Log Analysis
14 years ago • 981 Views
Logs for Incident Response and Forensics: Key Issues for GOVCERT.NL 2008
14 years ago • 2936 Views
Logs = Accountability
14 years ago • 3385 Views
Anton's Log Management 'Worst Practices'
14 years ago • 5128 Views
"Grand Challenges" of Log Management
14 years ago • 3319 Views
Early Look: Logging and Virtualization
14 years ago • 672 Views
Documents (29)
See all
"Compliance First" or "Security First"
13 years ago • 1370 Views
Myths of PCI DSS
13 years ago • 367 Views
Advanced Log Processing
13 years ago • 989 Views
Real-time fallacy: how real-time your security really is?
13 years ago • 455 Views
All Anton's Top11 Log Lists
13 years ago • 1605 Views
Log Analysis Across System Boundaries for Security, Compliance, and Operations
13 years ago • 408 Views
Log Data Mining
13 years ago • 8475 Views
Introduction to Database Log Analysis
13 years ago • 2602 Views
Where Logs Hide: Logs in Virtualized Environments
13 years ago • 273 Views
Five Mistakes of Vulnerability Management
13 years ago • 638 Views
Log Management in the Age of Compliance
13 years ago • 308 Views
Discovery of Compromised Machines
13 years ago • 841 Views
Computer Forensics in the Age of Compliance
13 years ago • 727 Views
Automated Incident Handling Using SIM
13 years ago • 691 Views
Days of the Honeynet: Attacks, Tools, Incidents
13 years ago • 522 Views
Chroot Protection and Breaking
13 years ago • 2880 Views
Covert Channels
13 years ago • 5275 Views
Security Event Analysis Through Correlation
13 years ago • 7139 Views
Take back your security infrastructure
13 years ago • 683 Views
Importance Of Structured Incident Response Process
13 years ago • 5899 Views
Audit logs for Security and Compliance
13 years ago • 4472 Views
Data hiding and finding on Linux
13 years ago • 2547 Views
Five IDS mistakes people make
13 years ago • 484 Views
Log Analysis Across System Boundaries for Security, Compliance, and Operations
13 years ago • 619 Views
Five Mistakes of Incident Response
13 years ago • 942 Views
Honeypot Essentials
13 years ago • 2424 Views
Logging "BrainBox" Short Article
13 years ago • 600 Views
What do I really need to do to STAY compliant with PCI DSS?
13 years ago • 717 Views
Log Management for PCI Compliance [OLD]
13 years ago • 1247 Views
Likes (167)
See all
Breaking The Cloud Kill Chain
Puma Security, LLC • 1 month ago
Alert Fidelity Measuring Detection Quality - march2019
Martin Potgieter • 1 year ago
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin • 1 year ago
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin • 1 year ago
DevSecOps: Key Controls to Modern Security Success
Puma Security, LLC • 3 years ago
50 Shades of Sigma
Florian Roth • 2 years ago
13 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy • 2 years ago
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; Keith McCammon, Red Canary
MITRE - ATT&CKcon • 3 years ago
Измерение эффективности SOC. 3 года спустя
Aleksey Lukatskiy • 3 years ago
Finding attacks with these 6 events
Michael Gough • 6 years ago
Deeplook into apt and how to detect and defend v1.0
Michael Gough • 7 years ago
Aligning Threat Intelligence to Defender Needs - Identifying Activity Groups
Joe Slowik • 4 years ago
Airbnb - StreamAlert
Amazon Web Services • 4 years ago
SplunkLive Brisbane Splunking the Endpoint
Splunk • 6 years ago
Security Analyst Workshop - 20190314
Florian Roth • 3 years ago
The Four Types of Threat Detection and Use Cases in Industrial Security
Dragos, Inc. • 4 years ago
5 советов, от которых зависит успешность вашего SOC
Aleksey Lukatskiy • 3 years ago
SACON - Enterprise Security Architecture (Bikash Barai)
Priyanka Aash • 5 years ago
Машинное обучение в кибербезопасности
Aleksey Lukatskiy • 4 years ago
EDR vs SIEM - The fight is on
Justin Henderson • 5 years ago
TOGAF 9 - Security Architecture Ver1 0
Maganathin Veeraragaloo • 12 years ago
Security architecture
Duncan Unwin • 10 years ago
Incident Response Triage
Albert Hui • 11 years ago
The Art and Science of Alert Triage
Sqrrl • 7 years ago
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
Raffael Marty • 6 years ago
AI & ML in Cyber Security - Why Algorithms Are Dangerous
Raffael Marty • 5 years ago
Adversarial Simulation Nickerson/Gates Wild West Hacking Fest Oct 2017
Chris Gates • 5 years ago
Building a Successful Internal Adversarial Simulation Team - Chris Gates & Chris Nickerson
Chris Gates • 6 years ago
Ландшафт технологий кибербезопасности 2025
Aleksey Lukatskiy • 5 years ago
SOC vs SIEM
Aleksey Lukatskiy • 5 years ago
Tags
chuvakin security logs logging log management log management siem pci compliance sim sem pci dss cybersecurity incident response analysis security management monitoring soc database forensics information security dss virtualization incident response trends security operations keynote incident handling strategy myths application web proxy ediscovery threat internal insiders loglogic accountability sans threat detection 2020 security analytics log analysis pci compliance standards linux honeynet correlation infosec qualys 2005 metrics baselining anton chuvakin detection and response cloud security cloud-native threats detection cloud computing cloud analytics 2016 log mana security aman u.s. securities and exchange commission security mana log ma data breaches inc worst practices best practices predictions future class williams pci dss myths 2010 why are they still alive by dr log review mistakes log managent honeypots ids intrusion detection cee covert channels malware honeypot compromise discovery regulations chuvakin vulnerability management mining handling
See more

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2023 SlideShare from Scribd

We've updated our privacy policy.

We’ve updated our privacy policy so that we are compliant with changing global privacy regulations and to provide you with insight into the limited ways in which we use your data.

You can read the details below. By accepting, you agree to the updated privacy policy.

Thank you!

View updated privacy policy
We've encountered a problem, please try again.