Télécommunications

The Importance of Threat Hunting: How Security Experts Detect and Respond to Threats

“Threat hunting is about understanding how adversaries are avoiding detection and taking a proactive approach to identifying signs of an attack.”

Robert Higham, Senior Cybersecurity at Secureworks, joins us to talk about why threat hunting should be proactive and iterative, how gathering intelligence and learning from it matters, when your organization should start threat hunting, common threats found in use cases, and the indicators of a successful threat hunt.

Tune in to the full episode — The Importance Of Threat Hunting with Robert Higham, Secureworks.

What You Will Discover:

✔️ Threat hunting should be proactive and iterative. Combine external and internal intelligence to decide what might be happening and act on it. Find out the likelihood of scenarios occurring again.

✔️ Prevent, detect, and hunt. Build your systems with preventative controls. Evaluate when threat hunting is appropriate for you. Know different strategies to start. This can include strengthening visibility and spotting deviations in your network.

✔️ Work with your countermeasure team. Share information across your organization. Create security recommendations for asset owners. Remove potentially unwanted programs that could cause problems.

✔️ Threat hunting is more than just detecting threats. How can we find targets sooner? What can we do to improve our detection time? How did the threat occur, and how can we block it in the future?

About Secureworks:

Secureworks is a Leader in Cybersecurity. We protect organizations by providing battle-tested, best-in-class cybersecurity solutions that reduce risks, improve security operations, and accelerate ROI for Security and IT teams.

In short, we’re here to secure human progress.

Learn more at https://www.secureworks.com/.

Views : 1016
cyber security

Source by Secureworks

Mourad ELGORMA

Fondateur de summarynetworks, passionné des nouvelles technologies et des métiers de Réseautique , Master en réseaux et système de télécommunications. ,j’ai affaire à Pascal, Delphi, Java, MATLAB, php …Connaissance du protocole TCP / IP, des applications Ethernet, des WLAN …Planification, installation et dépannage de problèmes de réseau informatique……Installez, configurez et dépannez les périphériques Cisco IOS. Surveillez les performances du réseau et isolez les défaillances du réseau. VLANs, protocoles de routage (RIPv2, EIGRP, OSPF.)…..Manipuler des systèmes embarqués (matériel et logiciel ex: Beaglebone Black)…Linux (Ubuntu, kali, serveur Mandriva Fedora, …). Microsoft (Windows, Windows Server 2003). ……Paquet tracer, GNS3, VMware Workstation, Virtual Box, Filezilla (client / serveur), EasyPhp, serveur Wamp,Le système de gestion WORDPRESS………Installation des caméras de surveillance ( technologie hikvision DVR………..). ,

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *