Resources Webinars
Threat hunting
Joe Moles Rick McElroy

From ad hoc to automated: how to operationalize threat hunting

 

Threat hunting is more than just a buzzword.

There is a lot of hype around threat hunting. Many organizations and providers talk about how they do it or how they can enable it. However, not enough focus is put on how to mature beyond ad hoc threat hunting in order to operationalize and automate efforts. This video discusses how to take the concept of threat hunting and build it into an operational process that drives business value.

Key topics include:

  • Moving from ad hoc to automation
  • Focusing on high-fidelity alerts
  • Building on organizational knowledge gained from threat hunts
  • Real-world examples of teams that successfully operationalized threat hunting
 
Plan ahead with Red Canary’s new Incident Response and Preparedness guide
 
Embrace the tangles: Infosec career advice from a technical account manager
 
The Red Canary Crash Course on Defender for Endpoint
 
We’re going to need a bigger boat: What to do when you outgrow your Kubernetes cluster