Cybersecurity , Data Breach , Incident & Breach Response

Threat Hunting: How to Evolve Your Incident Response

Tom Field and Ben Smith of RSA Security reflect on their recent Executive Roundtable
Threat Hunting: How to Evolve Your Incident Response

In the wake of advanced, invasive threats that can wreak havoc before detection, security leaders are rebooting their incident response programs to be less reactive, and more proactive. Proactive threat hunting is the goal... and yet many current threat hunting initiatives are deemed immature.

What does a mature threat hunting strategy look like? What are the necessary tools and skills, and what are the organizational requirements to ensure threat hunting success?

On June 14th, 2018 ISMG's Tom Field and Ben Smith, Field CTO at RSA Security, sat down with a group of local information security executives in Vienna, Virginia for an Executive Roundtable discussion on modern threat hunting.

Together, they tackled such topics as:

  • How do you rate your organization's current threat hunting capabilities?
  • Where are your biggest obstacles to improving threat hunting within your organization?
  • What is the roadmap to achieving a mature threat hunting capability - and what are the organizational requirements to ensure success?

In this interview (see audio link below photo), Ben reflects on common challenges and key findings from the discussion.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.