Intelligence & Analytics

Cyber Beat Live: The Art of Cyber Threat Hunting

Play the latest episode
Apr 24, 2017
35 minutes


Listen to the Security Intelligence Podcast wherever you get your podcasts.

Cyber Beat Live: The Art of Cyber Threat Hunting
April 24, 2017
| |
< 1 min read

You may think your organization is secure, but you can bet determined attackers will find a way in. And unfortunately, that isn’t even the worst of it. Once they are inside your systems, attackers often remain undetected for weeks or even months.

So, is there any hope for identifying and disrupting these unknown attackers and threats before they wreak havoc? This is precisely where cyber threat hunting enters the picture.

Cyber threat hunting is a new practice that many mature organizations are now folding into their security strategy. Threat hunting takes advantage of all available data sources, whether internal or external, to produce a comprehensive understanding of your threat landscape. Then, drawing on this insight, it develops actionable intelligence about how to offset or mitigate relevant threats.

In this podcast, IBM’s Bob Stasio discusses cyber threat hunting with featured guests Scott Schober and Morgan Wright. Listen now to learn:

  • How does cyber threat hunting differ from what a SIEM does? What other tools are involved?
  • Where and how can a team be trained to conduct cyber threat hunting? Is it difficult to find experts in this field?
  • What organizations or industries are successfully using cyber threat to disrupt attacks?

Listen to the podcast

To learn even more, watch the on-demand webinar, “Why You Need To Be Hunting Cyber Threats” or register for an interactive demo of IBM i2 Cyber Threat Analysis.

Bob Stasio
Global Offering Manager, IBM
Bob Stasio is a contributor for SecurityIntelligence.

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today
Press play to continue listening
00:00 00:00