01.11.2023 Views

The Cyber Defense eMagazine November Edition for 2023

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

A threat hunting program enables faster incident response times. It’s also much easier and cheaper to<br />

go threat hunting than to clean up after a security breach. Here’s how to create one <strong>for</strong> a business.<br />

1. Establish a Baseline<br />

Be<strong>for</strong>e they can establish a threat hunting program, business owners must gain a solid understanding of<br />

what’s typical within their work environment. For example, they should understand the usual employee<br />

behavior, activities and network operations that take place within the company. Establishing a baseline<br />

<strong>for</strong> what is and isn’t normal is the first step toward identifying outliers.<br />

2. Identify Important Assets<br />

What does the enterprise offer to hackers? What are its most valuable assets a threat actor would want<br />

to target? <strong>The</strong>se will differ from one company to another, but they often include aspects like money or<br />

client data. Identifying them helps establish why a threat hunting program is necessary and what it should<br />

focus on.<br />

3. Define Success<br />

<strong>The</strong> next important step is to define exactly what the program should achieve. What key per<strong>for</strong>mance<br />

indicators (KPIs) can the business use to measure its success?<br />

An example of a KPI is the number of vulnerabilities — specifically those that could’ve installed malware<br />

on the network — the team remediates within a specific timeframe. KPIs should tie directly to the main<br />

goal of finding and blocking threats, and should help set the cybersecurity team up <strong>for</strong> success.<br />

4. Select a Threat Hunting Strategy<br />

Not every threat hunting program looks the same. A few common strategies include:<br />

• Using the MITRE framework to decide where to start<br />

• Building a minefield under the assumption that a threat actor is already within a network<br />

• Blocking access entirely by building a wall, ensuring anything related to execution and initial<br />

access is blocked<br />

Different strategies address unique needs, so it’s crucial to find the right one <strong>for</strong> each business.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2023</strong> <strong>Edition</strong> 112<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!