How to Generate a Hypothesis for a Threat Hunt_

Webinar with Mor Levi, VP Security Practices AT CYBEREASON




While a large number of attacks can be prevented with automated security, the attacks that can evade it are often extremely damaging. This is where threat hunters come in. Threat hunters search out attacks happening in the system that automated tools may not have identified yet, or may not even identify at all.

While this approach has significant value for defense and visibility, many find the process of threat hunting to be too demanding. Security teams struggle with understanding their environment, overwhelmed by incoming data. What techniques do you use to threat hunt? Where do you even begin?

In this webinar, Mor Levi, VP of Security Practices at Cybereason, helps you understand how to generate a hypothesis for a threat hunt. While success and progress in a threat hunt can seem rather nuanced, if a threat hunter builds strong, intelligent hypotheses, threat hunts build value, add visibility, and compound on themselves.

Learn more about:

  • The best ways to use external threat intelligence to help threat hunt, with concrete examples;
  • The best ways to use internal threat intelligence to help threat hunt, with concrete examples; and
  • How to build an effective hypothesis for a threat hunt, no matter your security background.