|Anton A. Chuvakin
My Gartner blog
My publications site
Our "PCI Compliance" book site
My LinkedIn profile
My "Security Warrior" blog
Dr. Anton Chuvakin is a Research Director at Gartner's Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team.
Anton is a recognized security expert in the field of log management, SIEM and PCI DSS compliance. He is an author of books "Security Warrior", "Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management" and ""PCI Compliance, Third Edition: Understand and Implement Effective PCI Data Security Standard Compliance"" (book website) and a contributor to "Know Your Enemy II", "Information Security Management Handbook" and others. Anton has published dozens of papers on log management, SIEM, correlation, security data analysis, PCI DSS, security management. His blog "Security Warrior" is one of the most popular in the industry.
In addition, Anton teaches classes and presents at many security conferences across the world; he recently addressed audiences in United States, UK, Singapore, Spain, Russia and other countries. He works on emerging security standards and serves on advisory boards of several security start-ups.
Most recently, Anton was running his own security consulting practice, focusing on logging, SIEM and PCI DSS compliance for security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly a Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging Evangelist, tasked with educating the world about the importance of logging for security, compliance and operations. Before LogLogic, Anton was employed by a security vendor in a strategic product management role. Anton earned his Ph.D. degree from Stony Brook University.
My compliance book
My logging book
Book I contributed to
|Areas of Interest
"Implementing and Running SIEM: Approaches and Lessons"
"PCI DSS Myths 2010: Why Are They STILL Alive"
"LogChaos: Challenges and Opportunities of Security Log Standardization"
"Logs vs Insiders: Log Data as a Weapon of Choice Against Insider Attacks"
"What Every Organization Should Monitor and Log"
"Simple Log Mining"
"Seven Mistakes of Security Log Management"
Full list of security presentations.
All my presentations on Slideshare.
"Five mistakes of vulnerability management"
Full list of security publications
All my publication on DocStoc.
A. Chuvakin and J.Smith, "Evolution program for parton densities with perturbative heavy flavor boundary conditions", Comput.Phys.Commun. 143 (2002) 257-286
Full list of physics publications