Speaking at Gartner Security Summit 2018

Gartner Security & Risk Management Summit 2018 is coming soon and here is my traditional blog post summarizing my speaking at this upcoming event (Washington, DC, June 4-7, 2018).

  • “State of Security Operations, Monitoring and Analytics 2018” – a broad overview of the entire domain of security, analytics and operations, build by an amazing team of analysts from across different Gartner teams.
  • “How to Hunt for Security Threats” – Threat hunting (TH) is still a very hot topic, but very few organizations actually do it. Attend this session to learn the basics of practical hunting and how to start your TH effort (based on this awesome paper)
  • “How to Use the New Threat Simulation Tools” (joint with Augusto) – “Threat simulation tools may be the newest tool in your security toolkit. Join us and learn about the novel security tool category — threat simulation tools, and how to use these to test and improve your security.” (based on our future paper and these posts)
  • “Workshop: Starting a Security Monitoring, Detection and Response Initiative” (workshop joint with Augusto) – “We can’t prevent all threats, but it doesn’t mean people working on security monitoring and operations can’t start detecting and responding. But how do you do it without breaking the bank? How should you start with detection and response? This workshop will go through a structured approach to find out” (based on the future paper and these posts) <- this is NOT advanced, but focuses on usable basics.
  • Roundtable: How Did You Start Your Organization’s Detection and Response Capabilities?” (joint with Augusto) – “This roundtable will discuss planning approaches, challenges, pitfalls and the first steps taken in developing threat detection and response capabilities. Participants should bring their experiences on the initial phases of their threat detection and response capabilities.”

Augusto is also presenting, on deception and other fun topics, so wait for his blog post soon!

My past Gartner speaking:

*** This is a Security Bloggers Network syndicated blog from Anton Chuvakin authored by Anton Chuvakin. Read the original post at:

Cloud Workload Resilience PulseMeter

Step 1 of 8

How do you define cloud resiliency for cloud workloads? (Select 3)(Required)