Enviar pesquisa
Carregar
1st Russian CSO Summit Trends 2008
•
4 gostaram
•
1,090 visualizações
Anton Chuvakin
Seguir
1st Russian CSO Summit Trends 2008
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 22
Recomendados
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
Isaiah Edem
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
IT Security
IT Security
Raden Tjokro Partono
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
The Current State of Cybersecurity
The Current State of Cybersecurity
TruShield Security Solutions
Beyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
Segun Ebenezer Olaniyan
Recomendados
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
Isaiah Edem
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
IT Security
IT Security
Raden Tjokro Partono
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
The Current State of Cybersecurity
The Current State of Cybersecurity
TruShield Security Solutions
Beyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
Segun Ebenezer Olaniyan
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
Digital citizenship presentation
Digital citizenship presentation
Casey McDaniel
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
Five things I learned about information security
Five things I learned about information security
Major Hayden
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Stephen Abram
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
PECB
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
PECB
The Thing That Should Not Be
The Thing That Should Not Be
morisson
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Joshua Berman
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Priyanka Aash
Cybersecurity
Cybersecurity
ANGIEPAEZ304
The view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
IDERA Software
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
PacSecJP
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
PECB
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Anton Chuvakin
Current Emerging Threats
Current Emerging Threats
dnomura
Mais conteúdo relacionado
Mais procurados
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
Digital citizenship presentation
Digital citizenship presentation
Casey McDaniel
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
Five things I learned about information security
Five things I learned about information security
Major Hayden
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Stephen Abram
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
PECB
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
PECB
The Thing That Should Not Be
The Thing That Should Not Be
morisson
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Joshua Berman
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Priyanka Aash
Cybersecurity
Cybersecurity
ANGIEPAEZ304
The view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
IDERA Software
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
PacSecJP
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
PECB
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
Mais procurados
(20)
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Digital citizenship presentation
Digital citizenship presentation
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Five things I learned about information security
Five things I learned about information security
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
The Thing That Should Not Be
The Thing That Should Not Be
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Cybersecurity
Cybersecurity
The view of auditor on cybercrime
The view of auditor on cybercrime
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
Semelhante a 1st Russian CSO Summit Trends 2008
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Anton Chuvakin
Current Emerging Threats
Current Emerging Threats
dnomura
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana iisf...
Eoin Keary
Module0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
Jorge Orchilles
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
Keith Redman
Cyber security for Developers
Cyber security for Developers
techtutorus
The difference between a duck
The difference between a duck
SensePost
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
Security
Security
Bob Cherry
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
joshquarrie
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
kbzdox ivanovich
We cant hack ourselves secure
We cant hack ourselves secure
Eoin Keary
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
PCM
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
Matthew Pascucci
E security and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
Ben Johnson
Semelhante a 1st Russian CSO Summit Trends 2008
(20)
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Current Emerging Threats
Current Emerging Threats
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana iisf...
Module0&1 intro-foundations-b
Module0&1 intro-foundations-b
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
Cyber security for Developers
Cyber security for Developers
The difference between a duck
The difference between a duck
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Security
Security
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
We cant hack ourselves secure
We cant hack ourselves secure
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
E security and payment 2013-1
E security and payment 2013-1
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
Mais de Anton Chuvakin
Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
Anton Chuvakin
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Anton Chuvakin
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin
Modern SOC Trends 2020
Modern SOC Trends 2020
Anton Chuvakin
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton Chuvakin
Generic siem how_2017
Generic siem how_2017
Anton Chuvakin
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
Anton Chuvakin
Five SIEM Futures (2012)
Five SIEM Futures (2012)
Anton Chuvakin
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Anton Chuvakin
SIEM Primer:
SIEM Primer:
Anton Chuvakin
Mais de Anton Chuvakin
(20)
Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
Modern SOC Trends 2020
Modern SOC Trends 2020
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
Generic siem how_2017
Generic siem how_2017
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
Five SIEM Futures (2012)
Five SIEM Futures (2012)
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
SIEM Primer:
SIEM Primer:
Último
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
The Digital Insurer
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
Zilliz
Último
(20)
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
1st Russian CSO Summit Trends 2008
1.
Security Trends and
Predictions 2008 Dr Anton Chuvakin Chief Logging Evangelist LogLogic, Inc Mitigating Risk. Automating Compliance. CSO Summit Moscow, March 24-25, 2008
2.
3.
4.
Key theme: Compliance
and Security Why do you wear seat belts for fear of $50 fine, but do not wear them out of fear for your life?
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
Thank You Q
& A СПАСИБО ЗА ВНИМАНИЕ
Notas do Editor
Предсказания и тенденции по безопасности