How to Build Threat Hunting into Your Security Operations | Red Canary



Threat hunting is a term that is growing in popularity and also ambiguity. When an organization focuses on developing a threat hunting capability, what exactly should that look like? Organizations make the most measurable impact by using threat research to assess the effectiveness of their detection. Watch to learn: -The difference between automation and hunting -A process for continuous detection improvement As your security ally, Red Canary enables your team to focus on the highest priority security issues impacting your business. By removing your need to build and manage a threat detection operation, we help you focus on running your business securely and successfully. Our managed detection and response delivers threat detection, hunting, and response—driven by human expert analysis and guidance—applied across your entire security stack. Learn more about Red Canary MDR: https://ift.tt/3u2WzhI #SecurityOperations | #RedCanary | #ThreatHunting 0:00 Introduction 1:46 What is Threat Hunting? 3:25 Threat Hunting 101 5:26 Unite Man AND Machine Together 6:46 Visibility and Environment Normalization 9:21 ATT&CK Matrix: Post Exploitation Behaviors 18:44 Expand Detection Mindset Beyond the Moment of Compromise 19:51 Cb RESPONSE: VISUALIZE THE ATTACK KILL CHAIN 21:20 A Layered Approach to Threat Hunting 24:39 Automation Could Change Economics 26:45 Orchestration & Automation: Optimize! 36:57 Cb RESPONSE: HUNT THREATS IN REAL TIME 43:25 A Timeline to Start Threat Hunting

source: https://www.youtube.com/watch?v=58lS_pEElt8

Para mas noticias, visita: https://sectemple.blogspot.com/

Comments