Threat hunting is more than just a buzzword.
There is a lot of hype around threat hunting. Many organizations and providers talk about how they do it or how they can enable it. However, not enough focus is put on how to mature beyond ad hoc threat hunting in order to operationalize and automate efforts. This video discusses how to take the concept of threat hunting and build it into an operational process that drives business value.
Key topics include:
- Moving from ad hoc to automation
- Focusing on high-fidelity alerts
- Building on organizational knowledge gained from threat hunts
- Real-world examples of teams that successfully operationalized threat hunting
Related Resources
A large learning model: Red Canary’s AI journey
A large learning model: Red Canary’s AI journey
Red Canary CFP tracker: June 2025
Red Canary CFP tracker: June 2025
Here’s what you missed on Office Hours: May 2025
Here’s what you missed on Office Hours: May 2025
Getting started with Conditional Access: Comparing Entra ID Conditional Access with Cisco Duo Security
Getting started with Conditional Access: Comparing Entra ID Conditional Access with Cisco Duo Security