Are You Really Hunting? Developing and Implementing a Threat Hunting Methodology

Speakers

  • Jet Simpson

    Security Engineer

    ReliaQuest

  • Chris Newhart

    Security Engineer

    ReliaQuest

  • Miles Martin

    Manager of Sales Engineering

    ReliaQuest

.grid.gap-md .btn {display: none;}.aspect-ratio-16\:9.margin-bottom-md {margin-top: 35px;}

The industry emphasis on the constant implementation of new security tools and technologies has led organizations to make substantial investments into security personnel. Those talents are spent primarily on maintenance and reacting to the various alerts that these disparate technologies are built to address. A vast amount of time is spent investigating, tuning false positives, and ultimately responding to noise.

Join ReliaQuest in an open virtual discussion to talk through an overview of a tangible threat hunting methodology developed over years of hunting across hundreds of unique environments.

In this online discussion, Jet Simpson, Chris Newhart, and Miles Martin will discuss:

  • Leveraging industry trends to identify common threat hunting mistakes
  • How to best leverage technology as an enabler, not a solution
  • How to develop threat hunting campaigns and better understand use cases

{
“@context”: “https://schema.org”,
“@type”: “VideoObject”,
“name”: “ARE YOU REALLY HUNTING? DEVELOPING AND IMPLEMENTING A THREAT HUNTING METHODOLOGY”,
“description”: “Join us as we talk through an overview of tangible threat hunting methodologies developed over years of hunting across hundreds of unique environments.”,
“thumbnailUrl”: “https://www.reliaquest.com/wp-content/uploads/2020/07/ARE-YOU-REALLY-H[email protected]2x-scaled.jpg”,
“uploadDate”: “2020-07-17”,
“duration”: “PT39M35S”,
“contentUrl”: “https://www.reliaquest.com/resource/webinar/implementing-threat-hunting-methodology-across-security-environments/”,
“potentialAction”: {
“@type”: “SeekToAction”,
“target”: “https://www.reliaquest.com/resource/webinar/implementing-threat-hunting-methodology-across-security-environments/={seek_to_second_number}”,
“startOffset-input”: “required name=seek_to_second_number”
}
}

Watch Now

More resources

3 Proven Methods for Implementing a Continual Threat Hunting Program

.grid.gap-md .btn {display: none;}.aspect-ratio-16\:9.margin-bottom-md {margin-top: 35px;} Enterprise Security teams are looking for proven ways to increase the visibility of their security programs while also optimizing technology investments. A large number of organizations have implemented Endpoint Detection and Response (EDR) solutions and many others are considering it. While these solutions are best known as being effective […]

Accelerating Incident Response: Developing and Automating a Cyber Analysis Methodology

.grid.gap-md .btn {display: none;}.aspect-ratio-16\:9.margin-bottom-md {margin-top: 35px;} Standardization and automation can resolve critical cyber security challenges such as efficiency, alert fatigue, and analysis gaps. Through standardizing a Cyber Analysis Methodology, analyst teams can then enable true automation to tell the story that matters. Join ReliaQuest in an open virtual discussion to talk through the Cyber Analysis […]

Continuous Attack Simulations

Attack simulations continuously mimic real-world threats to highlight gaps in security systems, and unlike traditional ad hoc testing, they provide an ongoing view of dynamic security environments. Can the insights from attack simulations be used to close gaps and strengthen security programs? They can, if integrated into your existing security operations. In this paper, you’ll […]