How To Use Threat Hunting as Part of Your Cybersecurity Strategy to Benefit Your Organization

Опубликовано: 01 Январь 1970
на канале: Cyber Gray Matter
1,008
51

Hey everyone! Welcome back to Cyber Gray Matter! Today's video is on Threat Hunting and is a subscriber recommended topic, so thank you White Daka! @wyttee

I've seen various videos that go into the details on specific threat hunting techniques and others that discuss how complex and difficult it is; however, there aren't many for beginners that act as a tutorial of sorts and explain the way it fits and is implemented within an organization's cybersecurity strategy. Finding potential current and past threats in a SIEM and other logging tools can be daunting with so much data flowing through the network, and there are various ways to hunt for threats and identify the footprint of adversaries.

Imagine being a network security analyst at a healthcare organization, and you also act as a basic, ad hoc threat hunter when alerts come in, I've included a hypothetical and real-world phishing attack scenario at 8:42 that applies some of the information you just learned from early on in the video.

Some of the things we'll talk about what structured vs unstructured threat hunting is, threat intelligence feeds (ISACs), IOCs, TTPs, along with The Hunting Maturity Model (HMM) and the Pyramid of Pain, both developed by SANS instructor David Bianco.

00:00 Introduction
00:21 Philosophy of Threat Hunting
01:43 Structured Threat Hunting
02:07 Unstructured Threat Hunting
02:35 Intelligence-Driven
02:52 ISACs
03:15 Hunting Maturity Model (HMM)
06:19 Pyramid of Pain
08:42 Phishing Scenario
10:27 Outro

Contact -
Twitter:   / cybergraymattir  
Business Email : [email protected]

Links -
GitHub Awesome Threat Detection: https://github.com/0x4D31/awesome-thr...
Pyramid of Pain: https://www.sans.org/tools/the-pyrami...
Hunting Maturity Model: https://www.sans.org/tools/hunting-ma...
Data Staging at MITRE ATT&CK: https://attack.mitre.org/techniques/T...
Reactive and Proactive Security:https://cyberint.com/blog/thought-lea...
Best Practices: https://www.cynet.com/advanced-threat...

---------------------------------------------------------------------------------------------------------------------------------------------------------
Credits -

Video Assets:
All video assets are licensed through a subscription to Envato Elements for this specific project. https://elements.envato.com/

Music:

LICENSE CERTIFICATE: Envato Elements Item
=================================================
This license certificate documents a license to use the item listed below
on a non-exclusive, commercial, worldwide and revokable basis, for
one Single Use for this Registered Project.

Item Title: AI Documentary Suspense
Item URL: https://elements.envato.com/ai-docume...
Item ID: VCZ4MDD
Author Username: Orchestralis
Licensee: Cyber Vigilance
Registered Project Name: Threat Hunting
License Date: May 28th, 2023
Item License Code: 7GUYZ4HP56

LICENSE CERTIFICATE: Envato Elements Item
=================================================
This license certificate documents a license to use the item listed below
on a non-exclusive, commercial, worldwide and revokable basis, for
one Single Use for this Registered Project.

Item Title: Ambient for Documentary
Item URL: https://elements.envato.com/ambient-f...
Item ID: XB3MSHF
Author Username: ColorFilmMusic
Licensee: Cyber Vigilance
Registered Project Name: Threat Hunting
License Date: May 28th, 2023
Item License Code: QN8XG5DA6C

LICENSE CERTIFICATE: Envato Elements Item
=================================================
This license certificate documents a license to use the item listed below
on a non-exclusive, commercial, worldwide and revokable basis, for
one Single Use for this Registered Project.

Item Title: Ambient Dream
Item URL: https://elements.envato.com/ambient-d...
Item ID: BRC4C34
Author Username: DivaProductionMusic
Licensee: Cyber Vigilance
Registered Project Name: Threat Hunting
License Date: May 28th, 2023
Item License Code: VXTF5KS3HQ


Смотрите видео How To Use Threat Hunting as Part of Your Cybersecurity Strategy to Benefit Your Organization онлайн без регистрации, длительностью часов минут секунд в хорошем качестве. Это видео добавил пользователь Cyber Gray Matter 01 Январь 1970, не забудьте поделиться им ссылкой с друзьями и знакомыми, на нашем сайте его посмотрели 1,008 раз и оно понравилось 51 людям.