In this interactive and practical threat-hunting mastery series, we will walk you through the various concepts and techniques for threat-hunting. Gain a better understanding of what threat-hunting is all about, learn how to hunt down security threats, and more. We'll feature short, but informative and interesting videos, expert opinions, and best practice guides. These practical insights will help you strengthen your security operation center (SOC) using a proactive security approach.
Where do you stand in the threat-hunting maturity model?
I've just started gathering security data. But I'm not sure if I'm collecting all the necessary data.
I have set up the basic alerts to detect attacks.
Occasionally (or accidentally), I come across suspicious events and flag them as threats.
I've pretty much consolidated all the security data in a central location.
I've incorporated open source threat feeds to spot known malicious threats.
I've automated the security data collection process.
I've reconfigured the threat intelligence platforms to suit my organization's business requirements.
I'm still looking for known malicious threats. But I'm being effective about it.
Whoa! I've automated the entire security data collection process.
I've implemented new data analysis techniques to hunt threats (pattern-based and/or behavior-based data analysis).