Chris Mills, Senior Principal Engineer, Cybersecurity Solutions and Benjamin Lim, Principal Engineer, Cybersecurity Solutions
A solid security strategy generally starts with implementation of access controls and cyber hygiene, such as managing admin privileges and promptly applying patches and updates. Preventive measures are essential, though many attackers are capable of devising ways to get past them.
To address this risk, security professionals advise companies to incorporate threat monitoring and detection as an additional layer of protection. Sophisticated threat actors work hard to gain entry into networks, including those of mid-size and small companies, and move laterally to expand their impact. They know that soon after attack types are discovered, they are added to threat databases used in monitoring and detection and their particular methods could be rendered ineffective. So, threat actors modify their tactics, techniques and procedures (TTP) to evade automated detection technologies. This is where threat hunters make a vital contribution – they seek to uncover these hidden threats before they can be used to execute an attack.
In this webinar, Dell Technologies Services security experts will discuss the following topics:
• What is threat hunting?
• Why should companies consider threat hunting as a part of their security strategy?
• What skills, knowledge and attributes are exhibited by successful threat hunters?
Then, you’ll get a tour through a real-life threat hunting scenario, including characterizing the TTP profile executing the hunt and reviewing evidence, forensics reporting, and determining whether automated detection can be applied to similar attacks in the future. We’ll close with a short discussion of the threat hunting service included with Dell Technologies Managed Detection and Response.