Enviar búsqueda
Cargar
1st Russian CSO Summit Trends 2008
•
4 recomendaciones
•
1,090 vistas
Anton Chuvakin
Seguir
1st Russian CSO Summit Trends 2008
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 22
Recomendados
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
Isaiah Edem
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
IT Security
IT Security
Raden Tjokro Partono
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
The Current State of Cybersecurity
The Current State of Cybersecurity
TruShield Security Solutions
Beyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
Segun Ebenezer Olaniyan
Recomendados
Cybersecurity: The Danger, the Cost, the Retaliation
Cybersecurity: The Danger, the Cost, the Retaliation
PECB
Cyber Security & User's Privacy Invasion
Cyber Security & User's Privacy Invasion
Isaiah Edem
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
y3dips - Who Own Your Sensitive Information?
y3dips - Who Own Your Sensitive Information?
Ammar WK
IT Security
IT Security
Raden Tjokro Partono
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
Penetration Testing and Vulnerability Assessments: Examining the SEC and FINR...
TruShield Security Solutions
The Current State of Cybersecurity
The Current State of Cybersecurity
TruShield Security Solutions
Beyond The Dark Hacking Screen
Beyond The Dark Hacking Screen
Segun Ebenezer Olaniyan
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
Digital citizenship presentation
Digital citizenship presentation
Casey McDaniel
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
Five things I learned about information security
Five things I learned about information security
Major Hayden
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Stephen Abram
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
PECB
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
PECB
The Thing That Should Not Be
The Thing That Should Not Be
morisson
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Joshua Berman
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Priyanka Aash
Cybersecurity
Cybersecurity
ANGIEPAEZ304
The view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
IDERA Software
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
PacSecJP
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
PECB
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Anton Chuvakin
Current Emerging Threats
Current Emerging Threats
dnomura
Más contenido relacionado
La actualidad más candente
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
INKPPT
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Aditya Ratnaparkhi
Digital citizenship presentation
Digital citizenship presentation
Casey McDaniel
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
Five things I learned about information security
Five things I learned about information security
Major Hayden
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Stephen Abram
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
PECB
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
PECB
The Thing That Should Not Be
The Thing That Should Not Be
morisson
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
Joshua Berman
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Priyanka Aash
Cybersecurity
Cybersecurity
ANGIEPAEZ304
The view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
IDERA Software
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
PacSecJP
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
PECB
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Niran Seriki, CCISO, CISM
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
La actualidad más candente
(20)
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
Digital citizenship presentation
Digital citizenship presentation
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Five things I learned about information security
Five things I learned about information security
Maleeff university of toronto 11 july 2019
Maleeff university of toronto 11 july 2019
Thinking like a criminal – Cybersecurity 101
Thinking like a criminal – Cybersecurity 101
Thinking like a hacker - Introducing Hacker Vision
Thinking like a hacker - Introducing Hacker Vision
The Thing That Should Not Be
The Thing That Should Not Be
Security Kung Fu: SIEM Solutions
Security Kung Fu: SIEM Solutions
CV | Michele Spagnuolo
CV | Michele Spagnuolo
Web hacking using Cyber range
Web hacking using Cyber range
Cybersecurity
Cybersecurity
The view of auditor on cybercrime
The view of auditor on cybercrime
Database Security Risks You Might Not Have Considered, but Need To
Database Security Risks You Might Not Have Considered, but Need To
Akila srinivasan microsoft-bug_bounty-(publish)
Akila srinivasan microsoft-bug_bounty-(publish)
Cybersecurity on Business Resilience
Cybersecurity on Business Resilience
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
The Making of a simple Cyber Threat Intelligence Gathering System
The Making of a simple Cyber Threat Intelligence Gathering System
Cyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
Similar a 1st Russian CSO Summit Trends 2008
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Anton Chuvakin
Current Emerging Threats
Current Emerging Threats
dnomura
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana iisf...
Eoin Keary
Module0&1 intro-foundations-b
Module0&1 intro-foundations-b
BbAOC
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
Jorge Orchilles
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
SITA
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
Keith Redman
Cyber security for Developers
Cyber security for Developers
techtutorus
The difference between a duck
The difference between a duck
SensePost
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
drewz lin
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Rishi Singh
Security
Security
Bob Cherry
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
joshquarrie
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
kbzdox ivanovich
We cant hack ourselves secure
We cant hack ourselves secure
Eoin Keary
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
PCM
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
Matthew Pascucci
E security and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
Ben Johnson
Similar a 1st Russian CSO Summit Trends 2008
(20)
Interop 2007 Keynote Teaser
Interop 2007 Keynote Teaser
Current Emerging Threats
Current Emerging Threats
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana iisf...
Module0&1 intro-foundations-b
Module0&1 intro-foundations-b
Emerging Threats to Infrastructure
Emerging Threats to Infrastructure
Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
World of Watson 2016 - Information Insecurity
World of Watson 2016 - Information Insecurity
Cyber security for Developers
Cyber security for Developers
The difference between a duck
The difference between a duck
Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Security
Security
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Cyber Security: A Common Problem 2018
Cyber Security: A Common Problem 2018
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
We cant hack ourselves secure
We cant hack ourselves secure
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
E security and payment 2013-1
E security and payment 2013-1
State of Cyber: Views from an Industry Insider
State of Cyber: Views from an Industry Insider
Más de Anton Chuvakin
Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
Anton Chuvakin
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Anton Chuvakin
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Anton Chuvakin
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
Anton Chuvakin
Modern SOC Trends 2020
Modern SOC Trends 2020
Anton Chuvakin
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton Chuvakin
Generic siem how_2017
Generic siem how_2017
Anton Chuvakin
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
Anton Chuvakin
Five SIEM Futures (2012)
Five SIEM Futures (2012)
Anton Chuvakin
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Anton Chuvakin
SIEM Primer:
SIEM Primer:
Anton Chuvakin
Más de Anton Chuvakin
(20)
Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
Modern SOC Trends 2020
Modern SOC Trends 2020
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
Generic siem how_2017
Generic siem how_2017
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
Five SIEM Futures (2012)
Five SIEM Futures (2012)
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
SIEM Primer:
SIEM Primer:
Último
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
Curtis Poe
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
LoriGlavin3
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
Pixlogix Infotech
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
LoriGlavin3
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Dilum Bandara
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
BookNet Canada
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
HarshalMandlekar2
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
Raghuram Pandurangan
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
Sergiu Bodiu
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
hariprasad279825
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
Último
(20)
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
1st Russian CSO Summit Trends 2008
1.
Security Trends and
Predictions 2008 Dr Anton Chuvakin Chief Logging Evangelist LogLogic, Inc Mitigating Risk. Automating Compliance. CSO Summit Moscow, March 24-25, 2008
2.
3.
4.
Key theme: Compliance
and Security Why do you wear seat belts for fear of $50 fine, but do not wear them out of fear for your life?
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
Thank You Q
& A СПАСИБО ЗА ВНИМАНИЕ
Notas del editor
Предсказания и тенденции по безопасности