Data breaches cost companies money, customers, and their reputation. To mitigate the risk of cyber-attacks and breaches, organizations need to become “threat hunters” by proactively searching for threats that lurk on the network.
Building an effective threat hunting program can seem daunting and complex, but organizations can start hunting for threats with many of the basics they already have in place—like logs and automated alerts—and can build up their threat hunting capabilities from there.
Download the Dark Reading executive summary to learn how businesses can create a threat hunting program and improve their defenses by understanding how attackers think and identifying potential targets.
Key Takeaways:
About the Authors:
Stacey Halota, Vice President – Information Security and Privacy, Graham Holdings Company
Stacey Halota joined Graham Holdings Company (then The Washington Post Company) in 2003. She leads the development and implementation of information security and privacy programs, including Sarbanes Oxley, privacy law, Payment Card Industry compliance, and other data protection efforts. Halota has more than 20 years of experience in the information technology, security, and privacy field.
David Wolpoff, Co-Founder, CTO, Randori
David Wolpoff (Moose) is co-founder and CTO of Randori. David is a recognized expert in digital forensics, vulnerability research and embedded electronic design. Prior to founding Randori, David held executive positions at Kyrus Tech, a leading defense contractor, and ManTech where he oversaw teams conducting vulnerability research, forensics and offensive security efforts on-behalf of government and commercial clients. David holds a Bachelor of Science and Master of Science degrees in Electrical Engineering from the University of Colorado.