Beyond vulnerability scanning: Enhancing attack surface management for more proactive security


Building and Refining Threat Hunting Practices in Your Enterprise

Data breaches cost companies money, customers, and their reputation. To mitigate the risk of cyber-attacks and breaches, organizations need to become “threat hunters” by proactively searching for threats that lurk on the network.

Building an effective threat hunting program can seem daunting and complex, but organizations can start hunting for threats with many of the basics they already have in place—like logs and automated alerts—and can build up their threat hunting capabilities from there.

Download the Dark Reading executive summary to learn how businesses can create a threat hunting program and improve their defenses by understanding how attackers think and identifying potential targets.

Key Takeaways:

  • Threat hunting reduces the risk of cyberattacks and security breaches.
  • Companies need to better understand themselves to know potential threats.
  • Start with the basics when developing a threat hunting program.
  • When threat hunters understand how attackers think, they better predict threats.
  • To help businesses defend against attacks, Randori prioritizes the most important, most likely targets.

About the Authors: 

Stacey Halota, Vice President – Information Security and Privacy, Graham Holdings Company

Stacey Halota joined Graham Holdings Company (then The Washington Post Company) in 2003. She leads the development and implementation of information security and privacy programs, including Sarbanes Oxley, privacy law, Payment Card Industry compliance, and other data protection efforts. Halota has more than 20 years of experience in the information technology, security, and privacy field.

David Wolpoff, Co-Founder, CTO, Randori

David Wolpoff (Moose) is co-founder and CTO of Randori. David is a recognized expert in digital forensics, vulnerability research and embedded electronic design. Prior to founding Randori, David held executive positions at Kyrus Tech, a leading defense contractor, and ManTech where he oversaw teams conducting vulnerability research, forensics and offensive security efforts on-behalf of government and commercial clients. David holds a Bachelor of Science and Master of Science degrees in Electrical Engineering from the University of Colorado.