Threat hunting is more than just a buzzword.
There is a lot of hype around threat hunting. Many organizations and providers talk about how they do it or how they can enable it. However, not enough focus is put on how to mature beyond ad hoc threat hunting in order to operationalize and automate efforts. This video discusses how to take the concept of threat hunting and build it into an operational process that drives business value.
Key topics include:
- Moving from ad hoc to automation
- Focusing on high-fidelity alerts
- Building on organizational knowledge gained from threat hunts
- Real-world examples of teams that successfully operationalized threat hunting
Related Resources
Red Canary’s best of 2024
Red Canary’s best of 2024
Infosec horoscopes: Astrology for SOC teams
Infosec horoscopes: Astrology for SOC teams
The CrowdStrike outage: Detection and defense in depth
The CrowdStrike outage: Detection and defense in depth
Reel in troves of data with webhooks
Reel in troves of data with webhooks