Top 5 Best Practices to Elevate Your Threat Hunting Program
Thursday, June, 25th, 2020
Threat hunting is no longer a luxury, but a necessity. The sheer volume of threats and the ability of malware to lurk undetected warrants a program and skillset that proactively reduce time to detection and mitigate business risk. The growing adoption of YARA and MITRE ATT&CK have made the role of threat hunting more visible, and subsequently more vital to security operations. As a result, organizations are building formal Threat Hunting Programs to fill these undetected malware gaps and meet increasing compliance requirements.
In this session, we’ll discuss:
- How to assess your Threat Hunting maturity
- How to unify SOC operations across detection, response, and hunting, and across toolsets that use frameworks like MITRE ATT&CK
- How to manage YARA rules and local Threat Intelligence to expose hidden threats
- How to create an Early Warning System to identify threats before they have a chance to proliferate