This resource is no longer available
Threat hunting is a hypothesis driven approach to validating the collection, detection and analysis of data ahead of an incident. It is important to establish a threat hunting process to have for reference before any possible incidents.
This webcast outlines threat hunting strategies that security professionals can apply to their own environments. David Monahan, Managing Research Director at EMA and Taylor Wilkes-Pierce, Security Sales Engineer at DomainTools summarize key steps in a threat hunting process. These steps include maintaining:
- A repeatable process
- An activity log
- Source data
- Data integrity
- And more