Dr Anton Chuvakin Blog (Original)

This is Anton Chuvakin original blog (pre-Gartner) that I will now use to backup my Medium blog content (2023+)

Wednesday, May 16, 2007

My Presentation from CEIC2007 /Teaser/ Posted

Here is a teaser version of my CEIC 2007 presentation "Integrating Log Analysis into Your Incident Response Practice." Enjoy!
Posted by Anton Chuvakin at 12:07 PM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: conference, incident, log management, presentation, security

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Dr Anton Chuvakin

Dr Anton Chuvakin

RSS Feed

Subscribe Follow @anton_chuvakin

Recent Books

My Links

  • "PCI Compliance" book site
  • My website
  • My old presentations
  • My old portal Info-Secure.org
  • Old "Security Warrior" Book Site

Twitter

    follow me on Twitter

    Top Popular Posts

    • The Last Blog Post!
      This is my last blog post –for the foreseeable future. It is dated 7/31/2011 at 11:59PM. What happens tomorrow? A new life, of course! As...
    • Simple Log Review Checklist Released!
      Today, many people are looking for very simple solutions to big and complex problems – and the area of logging and log management is no exc...
    • Why No Open Source SIEM, EVER?
      Here is a perfect weekend post – on SIEM :-) Ok, all this Google web traffic of people searching for “ open source SIEM ” (sometimes “ ope...
    • Monthly Blog Round-Up – January 2018
      Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts based on last month’s visitor data  (excluding o...
    • Monthly Blog Round-Up – May 2017
      Here is my next monthly "Security Warrior" blog round-up of top 5 popular posts/topics this month: “New SIEM Whitepaper on Use C...

    Topics

    security (1012) log management (340) logging (308) compliance (234) PCI (187) logs (176) security management (129) reading (121) Monthly (119) conference (117) personal (95) blogging (92) trends (91) SIEM (89) humor (86) musings (83) presentation (75) SIM (67) SEM (64) future (46) news (46) malware (40) stupidity (40) intrusion (37) predictions (36) chuvakin (35) poll (31) RSA (30) standards (30) book (29) market (29) incident (28) SANS (27) paper (27) loglogic (26) risk (24) tips (23) warfare (23) CEE (19) PCI_Log_Review (19) marketing (19) Medium (17) TysonRhame (17) vendors (17) research (16) ROI (15) vulnerability (15) cloud (14) honeynet (14) privacy (14) 2010 (13) book review (13) forensics (13) metrics (12) Annual (11) jobs (11) review (10) 2009 (9) DLP (9) Medium Backup (9) data protection (9) podcast (9) websec (9) business (8) economics (8) saas (8) strategy (8) webinar (8) awareness (7) insiders (7) legal (7) 2008 (6) BlackHat (6) Detection Engineering (6) Gartner (6) attack (6) LogChat (5) career (5) consulting (5) database (5) haiku (5) myth (5) product management (5) qualys (5) security theater (5) software (5) virtual (5) 2007 (4) FAIL (4) application (4) encryption (4) incident response (4) mistakes (4) search (4) travel (4) virtualization (4) visualization (4) web logs (4) windows (4) 2011 (3) DRM (3) GRC (3) NIST (3) audit (3) awesomeness (3) correlation (3) government (3) interview (3) intrusion detection (3) open source (3) perimeter (3) politics (3) pontification (3) questions (3) vulnerability management (3) 2012 (2) HIPAA (2) ShmooCon (2) access (2) best practices (2) competitive (2) cybercrime (2) e-discovery (2) evangelism (2) glossary (2) keynote (2) knowledge management (2) new (2) rootkit (2) stratfor (2) tools (2) twitter (2) 0day (1) 2013 (1) 2019 (1) 2020 (1) Android (1) Cloud Threats (1) EMAP (1) IANS (1) IPv6 (1) SOC (1) analogy (1) announcements (1) architecture (1) authentication (1) blo (1) comments (1) computers (1) controversy (1) cool (1) current (1) data mining (1) fraud (1) geopolitics (1) guest post (1) identity (1) innovation (1) linux (1) mobile (1) obvious (1) platform (1) policy (1) reflections (1) semantic (1) storage (1) video (1) whitepaper (1)

    About Me

    Anton Chuvakin
    View my complete profile

    Blog Archive

    • ►  2024 (18)
      • ►  December (2)
      • ►  October (2)
      • ►  July (2)
      • ►  June (1)
      • ►  May (1)
      • ►  April (2)
      • ►  March (5)
      • ►  February (2)
      • ►  January (1)
    • ►  2023 (8)
      • ►  December (1)
      • ►  November (2)
      • ►  October (5)
    • ►  2019 (1)
      • ►  July (1)
    • ►  2018 (7)
      • ►  August (2)
      • ►  June (1)
      • ►  May (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2017 (12)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2016 (14)
      • ►  December (2)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2015 (15)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (3)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2014 (14)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (1)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (3)
      • ►  February (1)
      • ►  January (1)
    • ►  2013 (15)
      • ►  December (2)
      • ►  November (1)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  July (2)
      • ►  June (1)
      • ►  May (1)
      • ►  April (1)
      • ►  March (1)
      • ►  February (1)
      • ►  January (2)
    • ►  2012 (25)
      • ►  December (3)
      • ►  November (2)
      • ►  October (1)
      • ►  September (2)
      • ►  August (2)
      • ►  July (3)
      • ►  June (2)
      • ►  May (2)
      • ►  April (2)
      • ►  March (2)
      • ►  February (2)
      • ►  January (2)
    • ►  2011 (68)
      • ►  December (1)
      • ►  November (1)
      • ►  October (1)
      • ►  September (2)
      • ►  August (2)
      • ►  July (12)
      • ►  June (4)
      • ►  May (8)
      • ►  April (6)
      • ►  March (10)
      • ►  February (8)
      • ►  January (13)
    • ►  2010 (137)
      • ►  December (22)
      • ►  November (12)
      • ►  October (6)
      • ►  September (11)
      • ►  August (15)
      • ►  July (7)
      • ►  June (6)
      • ►  May (10)
      • ►  April (10)
      • ►  March (14)
      • ►  February (15)
      • ►  January (9)
    • ►  2009 (193)
      • ►  December (11)
      • ►  November (12)
      • ►  October (23)
      • ►  September (16)
      • ►  August (15)
      • ►  July (13)
      • ►  June (18)
      • ►  May (11)
      • ►  April (20)
      • ►  March (19)
      • ►  February (14)
      • ►  January (21)
    • ►  2008 (311)
      • ►  December (18)
      • ►  November (20)
      • ►  October (23)
      • ►  September (15)
      • ►  August (19)
      • ►  July (19)
      • ►  June (22)
      • ►  May (28)
      • ►  April (45)
      • ►  March (27)
      • ►  February (33)
      • ►  January (42)
    • ▼  2007 (479)
      • ►  December (21)
      • ►  November (44)
      • ►  October (57)
      • ►  September (57)
      • ►  August (51)
      • ►  July (49)
      • ►  June (34)
      • ▼  May (39)
        • Anton Security Tip of the Day #10: Email Tracking ...
        • On Mobile Malware II
        • Data-at-Rest, Data-in-Motion AND Data-in-Use?
        • Networks of Tomorrow
        • Puzzle vs Mystery: Great Reading to Think About
        • Somebody Asked Me ...
        • On CooL
        • Risk: Love It or Hate It
        • Apps as Employees
        • On Security Architecture
        • On Mobile Malware: Yay or Nay!?
        • More On Trusting the Software
        • Log Management Tops the Charts ...
        • More Terms from Logging Glossary Published
        • My Presentation from CONFidence 2007 /Teaser/ Posted
        • BaySec in TODAY!
        • My Presentation from CEIC2007 /Teaser/ Posted
        • On "Incident management in the age of compliance"
        • CrapPoint
        • Competent vs Likable
        • Are You Mad? Are We All?
        • On “Is your PC virus-free? Get it infected here!”
        • Have Phun Phishing ...
        • Logging Glossary: All the Terms and Then Some
        • On Visitor "Logs"?
        • Log Management Leads to System Manageability
        • Visualization Fans, Read This
        • Closure (Kind of) to the Anti-Virus Efficiency/Eff...
        • Presenting at CEIC 2007
        • BaySec!!!
        • Few Bits on Log Management Trends
        • From the "Nobody is That Dumb .... Oh, Wait" Depar...
        • More on Web Vulns
        • It Was All Him, That Bad Boy 10.11.2.3
        • My Impressions of SANS Log Management Summit 2007
        • Agreed - Totally Hate It! :-)
        • On "Top 10 Internet Crimes of 2006"
        • More Vendor on Vendor Action
        • People vs Technology vs People
      • ►  April (21)
      • ►  March (30)
      • ►  February (30)
      • ►  January (46)
    • ►  2006 (370)
      • ►  December (24)
      • ►  November (25)
      • ►  October (24)
      • ►  September (31)
      • ►  August (34)
      • ►  July (31)
      • ►  June (23)
      • ►  May (20)
      • ►  April (52)
      • ►  March (41)
      • ►  February (33)
      • ►  January (32)
    • ►  2005 (34)
      • ►  December (34)

    Labels and Tags

    Copyright Anton Chuvakin. Simple theme. Powered by Blogger.