The document discusses threat hunting and incident response. It describes building a threat hunting program and threat response platform with key components like visibility, proactivity, and response. It discusses investigating incidents, making judgments on observables from various data sources, and taking targeted mitigation actions. The goal is to integrate security tools and orchestrate threat research and response through a centralized threat response platform.
1. #CLUS
Del enfoque reactivo al
enfoque proactivo,
aprendiendo a cazar al
enemigo!
Miguel Garro CISM, CEH, SFCP
Cybersecurity Consulting Systems Engineer
Perú, Ecuador, Bolivia.