<img src="https://ws.zoominfo.com/pixel/JrRu3vUM8j33QSR7Bwxw" width="1" height="1" style="display: none;">
June 25, 2020, 2pm EDT

Top 5 Best Practices to Elevate Your Threat Hunting Program

Top 5 Best Practices to Elevate Your Threat Hunting Program
Tuning your SOC to Effectively Hunt Threats

Hrvoje Samardzic, Product Manager, and Chip Epps, Director Product & Solutions Marketing

Threat hunting is no longer a luxury, but a necessity. The sheer volume of threats and the ability of malware to lurk undetected warrants a program and skillset that proactively reduce time to detection and mitigate business risk. The growing adoption of YARA and MITRE ATT&CK have made the role of threat hunting more visible, and subsequently more vital to security operations. As a result, organizations are building formal Threat Hunting Programs to fill these undetected malware gaps and meet increasing compliance requirements.
In this session, we’ll discuss:
● How to assess your Threat Hunting maturity
● How to unify SOC operations across detection, response, and hunting, and across toolsets that use frameworks like MITRE ATT&CK
● How to manage YARA rules and local Threat Intelligence to expose hidden threats, and
● How to create an Early Warning System to identify threats before they have a chance to proliferate

Reversing 2020