There is no question that organizations struggle to identify attacks; in fact the global median dwell time is 101 days. Many security units have built threat hunting programs in order to mitigate this issue. However, according to a 2018 survey conducted by Cybersecurity Insiders, although 75% of respondents believe threat hunting is of major importance, only 18% of respondents’ organizations have someone knowledgeable enough to perform threat hunting.
What are the inhibitors to threat hunting programs? Many security organizations feel overwhelmed by the prospect of building these programs themselves. To this end, DomainTools partnered with EMA to outline strategies security professionals can apply to their own environments. Join Managing Director of Research at EMA, David Monahan and DomainTools Security Sales Engineer, Taylor Wilkes-Pierce to learn the building blocks necessary to building a threat hunting program from scratch including practical steps your organization can put into place right away.
In this webinar, you will learn:
The threat hunting process
Common pitfalls and mistakes
Valuable data sources and useful resources
How you can hunt using DomainTools Iris
1. IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
David Monahan
Managing Research Director, Security and Risk Management
Enterprise Management Associates
@SecurityMonahan
The Beginner’s Guide to Threat Hunting
Taylor Wilkes-Pierce
Security Sales Engineer
DomainTools
@tw_pierce