Hey everyone! Welcome back to Cyber Gray Matter! Today's video is on Threat Hunting and is a subscriber recommended topic, so thank you White Daka! @wyttee
I've seen various videos that go into the details on specific threat hunting techniques and others that discuss how complex and difficult it is; however, there aren't many for beginners that act as a tutorial of sorts and explain the way it fits and is implemented within an organization's cybersecurity strategy. Finding potential current and past threats in a SIEM and other logging tools can be daunting with so much data flowing through the network, and there are various ways to hunt for threats and identify the footprint of adversaries.
Imagine being a network security analyst at a healthcare organization, and you also act as a basic, ad hoc threat hunter when alerts come in, I've included a hypothetical and real-world phishing attack scenario at 8:42 that applies some of the information you just learned from early on in the video.
Some of the things we'll talk about what structured vs unstructured threat hunting is, threat intelligence feeds (ISACs), IOCs, TTPs, along with The Hunting Maturity Model (HMM) and the Pyramid of Pain, both developed by SANS instructor David Bianco.
00:00 Introduction
00:21 Philosophy of Threat Hunting
01:43 Structured Threat Hunting
02:07 Unstructured Threat Hunting
02:35 Intelligence-Driven
02:52 ISACs
03:15 Hunting Maturity Model (HMM)
06:19 Pyramid of Pain
08:42 Phishing Scenario
10:27 Outro
Contact -
Twitter: / cybergraymattir
Business Email : [email protected]
Links -
GitHub Awesome Threat Detection: https://github.com/0x4D31/awesome-thr...
Pyramid of Pain: https://www.sans.org/tools/the-pyrami...
Hunting Maturity Model: https://www.sans.org/tools/hunting-ma...
Data Staging at MITRE ATT&CK: https://attack.mitre.org/techniques/T...
Reactive and Proactive Security:https://cyberint.com/blog/thought-lea...
Best Practices: https://www.cynet.com/advanced-threat...
---------------------------------------------------------------------------------------------------------------------------------------------------------
Credits -
Video Assets:
All video assets are licensed through a subscription to Envato Elements for this specific project. https://elements.envato.com/
Music:
LICENSE CERTIFICATE: Envato Elements Item
=================================================
This license certificate documents a license to use the item listed below
on a non-exclusive, commercial, worldwide and revokable basis, for
one Single Use for this Registered Project.
Item Title: AI Documentary Suspense
Item URL: https://elements.envato.com/ai-docume...
Item ID: VCZ4MDD
Author Username: Orchestralis
Licensee: Cyber Vigilance
Registered Project Name: Threat Hunting
License Date: May 28th, 2023
Item License Code: 7GUYZ4HP56
LICENSE CERTIFICATE: Envato Elements Item
=================================================
This license certificate documents a license to use the item listed below
on a non-exclusive, commercial, worldwide and revokable basis, for
one Single Use for this Registered Project.
Item Title: Ambient for Documentary
Item URL: https://elements.envato.com/ambient-f...
Item ID: XB3MSHF
Author Username: ColorFilmMusic
Licensee: Cyber Vigilance
Registered Project Name: Threat Hunting
License Date: May 28th, 2023
Item License Code: QN8XG5DA6C
LICENSE CERTIFICATE: Envato Elements Item
=================================================
This license certificate documents a license to use the item listed below
on a non-exclusive, commercial, worldwide and revokable basis, for
one Single Use for this Registered Project.
Item Title: Ambient Dream
Item URL: https://elements.envato.com/ambient-d...
Item ID: BRC4C34
Author Username: DivaProductionMusic
Licensee: Cyber Vigilance
Registered Project Name: Threat Hunting
License Date: May 28th, 2023
Item License Code: VXTF5KS3HQ
Watch video How To Use Threat Hunting as Part of Your Cybersecurity Strategy to Benefit Your Organization online without registration, duration hours minute second in high quality. This video was added by user Cyber Gray Matter 01 January 1970, don't forget to share it with your friends and acquaintances, it has been viewed on our site 1,008 once and liked it 51 people.