A frequent conference speaker, he also represents the company at various security meetings and standards organizations. He is an author of a book “Security Warrior” and a contributor to “Know Your Enemy II”, “Information Security Management Handbook”, “Hacker’s Challenge 3″ and the upcoming book on PCI. Anton also published numerous papers on a broad range of security subjects. In his spare time he maintains his security portal http://www.info-secure.org and several blogs.”
It will then describe a methodology for log collection and analysis ? with forensic use in mind - as well as practical examples and investigations. Logs often will provide most of the answers needed for the investigators (such as the attack success confirmation and details attacker’s behavior) without diving deeply into a time-consuming expensive and often unreliable disk image forensics. Another rarely covered but critical item that will be discussed is preserving log evidence integrity and possible challenges to such integrity.