Artwork

Sisällön tarjoaa Team Cymru. Team Cymru tai sen podcast-alustan kumppani lataa ja toimittaa kaiken podcast-sisällön, mukaan lukien jaksot, grafiikat ja podcast-kuvaukset. Jos uskot jonkun käyttävän tekijänoikeudella suojattua teostasi ilman lupaasi, voit seurata tässä https://fi.player.fm/legal kuvattua prosessia.
Player FM - Podcast-sovellus
Siirry offline-tilaan Player FM avulla!

T. Rowe Price’s Matthew Winters on Threat Hunting as the Scientific Method

19:56
 
Jaa
 

Manage episode 449118029 series 3505153
Sisällön tarjoaa Team Cymru. Team Cymru tai sen podcast-alustan kumppani lataa ja toimittaa kaiken podcast-sisällön, mukaan lukien jaksot, grafiikat ja podcast-kuvaukset. Jos uskot jonkun käyttävän tekijänoikeudella suojattua teostasi ilman lupaasi, voit seurata tässä https://fi.player.fm/legal kuvattua prosessia.

In our latest episode of the Future of Threat Intelligence podcast, David speaks with Matthew Winters, Lead Threat Hunter at T. Rowe Price. Matthew shares his unconventional journey into cybersecurity, highlighting the importance of soft skills and creativity in threat hunting that he has picked up along the way.

He explains that threat hunting is akin to applying the scientific method to networks, starting with hypotheses rather than alerts. Matthew and David also explore the critical role of threat intelligence in shaping effective hunting strategies and the essential skills needed to build a successful threat hunting team. Tune in for valuable insights on enhancing your cybersecurity posture!

Topics discussed:

  • Threat hunting as applying the scientific method, starting with hypotheses instead of relying solely on alerts.
  • The importance of threat intelligence as a foundational element for effective threat hunting and proactive defense strategies.
  • Key skills for threat hunters include technical knowledge, creativity, and the ability to reassess and redefine problem statements.
  • A hybrid approach to data analysis is recommended, utilizing both network and endpoint data for comprehensive threat visibility.
  • The challenges of measuring threat hunting effectiveness, and suggestions for metrics like defenses created and impact on adversaries.

Key Takeaways:

  • Explore veteran programs to facilitate career transitions into cybersecurity, leveraging the unique skills and experiences of military personnel.
  • Adopt the scientific method in threat hunting by formulating hypotheses before analyzing data, ensuring a structured approach to investigations.
  • Utilize threat intelligence to inform your threat hunting strategies, focusing on real-world adversary behaviors and techniques relevant to your organization.
  • Encourage creativity within your team by identifying individuals with a "MacGyver Drive" who can think outside the box to solve complex problems.
  • Implement a hybrid data analysis approach by integrating both network and endpoint data to gain comprehensive visibility into potential threats.
  • Define clear boundaries between threat hunting, incident response, and red teaming to maintain focus and effectiveness in each discipline.
  • Measure the effectiveness of your threat hunting program by tracking metrics such as defenses created and the impact on adversaries.
  • Foster a culture of continuous learning within your threat hunting team to enhance skills and adapt to evolving cybersecurity challenges.
  • Leverage tools like graph databases to analyze relationships between threats and improve the precision of your hunting efforts.
  • Challenge your team to reassess problem statements regularly, ensuring they are asking the right questions to drive effective threat hunting.
  continue reading

64 jaksoa

Artwork
iconJaa
 
Manage episode 449118029 series 3505153
Sisällön tarjoaa Team Cymru. Team Cymru tai sen podcast-alustan kumppani lataa ja toimittaa kaiken podcast-sisällön, mukaan lukien jaksot, grafiikat ja podcast-kuvaukset. Jos uskot jonkun käyttävän tekijänoikeudella suojattua teostasi ilman lupaasi, voit seurata tässä https://fi.player.fm/legal kuvattua prosessia.

In our latest episode of the Future of Threat Intelligence podcast, David speaks with Matthew Winters, Lead Threat Hunter at T. Rowe Price. Matthew shares his unconventional journey into cybersecurity, highlighting the importance of soft skills and creativity in threat hunting that he has picked up along the way.

He explains that threat hunting is akin to applying the scientific method to networks, starting with hypotheses rather than alerts. Matthew and David also explore the critical role of threat intelligence in shaping effective hunting strategies and the essential skills needed to build a successful threat hunting team. Tune in for valuable insights on enhancing your cybersecurity posture!

Topics discussed:

  • Threat hunting as applying the scientific method, starting with hypotheses instead of relying solely on alerts.
  • The importance of threat intelligence as a foundational element for effective threat hunting and proactive defense strategies.
  • Key skills for threat hunters include technical knowledge, creativity, and the ability to reassess and redefine problem statements.
  • A hybrid approach to data analysis is recommended, utilizing both network and endpoint data for comprehensive threat visibility.
  • The challenges of measuring threat hunting effectiveness, and suggestions for metrics like defenses created and impact on adversaries.

Key Takeaways:

  • Explore veteran programs to facilitate career transitions into cybersecurity, leveraging the unique skills and experiences of military personnel.
  • Adopt the scientific method in threat hunting by formulating hypotheses before analyzing data, ensuring a structured approach to investigations.
  • Utilize threat intelligence to inform your threat hunting strategies, focusing on real-world adversary behaviors and techniques relevant to your organization.
  • Encourage creativity within your team by identifying individuals with a "MacGyver Drive" who can think outside the box to solve complex problems.
  • Implement a hybrid data analysis approach by integrating both network and endpoint data to gain comprehensive visibility into potential threats.
  • Define clear boundaries between threat hunting, incident response, and red teaming to maintain focus and effectiveness in each discipline.
  • Measure the effectiveness of your threat hunting program by tracking metrics such as defenses created and the impact on adversaries.
  • Foster a culture of continuous learning within your threat hunting team to enhance skills and adapt to evolving cybersecurity challenges.
  • Leverage tools like graph databases to analyze relationships between threats and improve the precision of your hunting efforts.
  • Challenge your team to reassess problem statements regularly, ensuring they are asking the right questions to drive effective threat hunting.
  continue reading

64 jaksoa

Kaikki jaksot

×
 
Loading …

Tervetuloa Player FM:n!

Player FM skannaa verkkoa löytääkseen korkealaatuisia podcasteja, joista voit nauttia juuri nyt. Se on paras podcast-sovellus ja toimii Androidilla, iPhonela, ja verkossa. Rekisteröidy sykronoidaksesi tilaukset laitteiden välillä.

 

Pikakäyttöopas