You may think your organization is secure, but you can bet determined attackers will find a way in. And unfortunately, that isn’t even the worst of it. Once they are inside your systems, attackers often remain undetected for weeks or even months.
So, is there any hope for identifying and disrupting these unknown attackers and threats before they wreak havoc? This is precisely where cyber threat hunting enters the picture.
Cyber threat hunting is a new practice that many mature organizations are now folding into their security strategy. Threat hunting takes advantage of all available data sources, whether internal or external, to produce a comprehensive understanding of your threat landscape. Then, drawing on this insight, it develops actionable intelligence about how to offset or mitigate relevant threats.
In this podcast, IBM’s Bob Stasio discusses cyber threat hunting with featured guests Scott Schober and Morgan Wright. Listen now to learn:
- How does cyber threat hunting differ from what a SIEM does? What other tools are involved?
- Where and how can a team be trained to conduct cyber threat hunting? Is it difficult to find experts in this field?
- What organizations or industries are successfully using cyber threat to disrupt attacks?
Listen to the podcast
To learn even more, watch the on-demand webinar, “Why You Need To Be Hunting Cyber Threats” or register for an interactive demo of IBM i2 Cyber Threat Analysis.
Global Offering Manager, IBM
Bob Stasio is a contributor for SecurityIntelligence.