T. Rowe Price’s Matthew Winters on Threat Hunting as the Scientific Method
Manage episode 449118029 series 3505153
In our latest episode of the Future of Threat Intelligence podcast, David speaks with Matthew Winters, Lead Threat Hunter at T. Rowe Price. Matthew shares his unconventional journey into cybersecurity, highlighting the importance of soft skills and creativity in threat hunting that he has picked up along the way.
He explains that threat hunting is akin to applying the scientific method to networks, starting with hypotheses rather than alerts. Matthew and David also explore the critical role of threat intelligence in shaping effective hunting strategies and the essential skills needed to build a successful threat hunting team. Tune in for valuable insights on enhancing your cybersecurity posture!
Topics discussed:
- Threat hunting as applying the scientific method, starting with hypotheses instead of relying solely on alerts.
- The importance of threat intelligence as a foundational element for effective threat hunting and proactive defense strategies.
- Key skills for threat hunters include technical knowledge, creativity, and the ability to reassess and redefine problem statements.
- A hybrid approach to data analysis is recommended, utilizing both network and endpoint data for comprehensive threat visibility.
- The challenges of measuring threat hunting effectiveness, and suggestions for metrics like defenses created and impact on adversaries.
Key Takeaways:
- Explore veteran programs to facilitate career transitions into cybersecurity, leveraging the unique skills and experiences of military personnel.
- Adopt the scientific method in threat hunting by formulating hypotheses before analyzing data, ensuring a structured approach to investigations.
- Utilize threat intelligence to inform your threat hunting strategies, focusing on real-world adversary behaviors and techniques relevant to your organization.
- Encourage creativity within your team by identifying individuals with a "MacGyver Drive" who can think outside the box to solve complex problems.
- Implement a hybrid data analysis approach by integrating both network and endpoint data to gain comprehensive visibility into potential threats.
- Define clear boundaries between threat hunting, incident response, and red teaming to maintain focus and effectiveness in each discipline.
- Measure the effectiveness of your threat hunting program by tracking metrics such as defenses created and the impact on adversaries.
- Foster a culture of continuous learning within your threat hunting team to enhance skills and adapt to evolving cybersecurity challenges.
- Leverage tools like graph databases to analyze relationships between threats and improve the precision of your hunting efforts.
- Challenge your team to reassess problem statements regularly, ensuring they are asking the right questions to drive effective threat hunting.
64 jaksoa