01.11.2023 Views

The Cyber Defense eMagazine November Edition for 2023

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine November Edition for 2023 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 196 page November Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5. Decide Whether to Automate<br />

Although automation isn’t required <strong>for</strong> threat hunting, many companies — especially those with<br />

established, advanced cybersecurity programs — automate part of the process to reduce errors and<br />

boost productivity. For businesses that pursue the automation route, it’s crucial to have the right staff to<br />

develop and maintain the software. It’s also vital to closely monitor the automation process so it remains<br />

relevant.<br />

6. Create a Formal Security Operations Center (SOC)<br />

Another important step in building a threat hunting program is establishing an SOC. This process<br />

involves:<br />

• Creating a centralized logging system to data collecting logs such as host endpoint alerts, event<br />

logs, AD logs, routers and switches<br />

• Setting up an automated detection system — such as IDS or SIEM — if desired<br />

• Acquiring external signature and intel feeds to complement the automated detection system<br />

• Hiring an incident response team to resolve alerts and investigate incidents<br />

7. Create Testable Hypotheses<br />

<strong>The</strong> main feature distinguishing threat hunting from reactive cybersecurity is it’s proactive, not based on<br />

alerts. Threat hunters look <strong>for</strong> problems long be<strong>for</strong>e the alarm even sounds. To do this, they build<br />

hypotheses and then set about testing them.<br />

For example, a hypothesis could state that if hackers executed a certain type of malware on the company<br />

network, very specific evidence would exist to prove the malware is on the system. Essentially, if the<br />

malware exists, it will leave a detectable signature.<br />

Threat hunters will then use that theory to run iterative hunting campaigns in their search <strong>for</strong> malware.<br />

<strong>The</strong>y will look <strong>for</strong> the specific evidence outlined in their hypothesis to try and detect it.<br />

8. Think Like a Hacker<br />

Lastly, creating a threat hunting program means thinking in a proactive rather than reactive manner. It<br />

entails always looking <strong>for</strong> vulnerabilities in the enterprise’s network and wondering how best to exploit<br />

them.<br />

To sharpen their proactive thinking, threat hunters can use purple teaming <strong>for</strong> testing. This strategy<br />

involves security teams simulating malicious attacks against the organization’s network, then working<br />

together to solve them.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>November</strong> <strong>2023</strong> <strong>Edition</strong> 113<br />

Copyright © <strong>2023</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!