Fraud Management & Cybercrime , Governance & Risk Management , Incident & Breach Response
Threat Hunting: How to Evolve Your Incident ResponseTom Field and Ben Smith of RSA Security reflect on their recent Executive Roundtable
In the wake of advanced, invasive threats that can wreak havoc before detection, security leaders are rebooting their incident response programs to be less reactive, and more proactive. Proactive threat hunting is the goal... and yet many current threat hunting initiatives are deemed immature.
What does a mature threat hunting strategy look like? What are the necessary tools and skills, and what are the organizational requirements to ensure threat hunting success?
On July 24th, 2018 ISMG's Tom Field and Ben Smith, Field CTO at RSA Security, sat down with a group of local information security executives in Atlanta, Georgia for an Executive Roundtable discussion on modern threat hunting.
Together, they tackled such topics as:
- How do you rate your organization's current threat hunting capabilities?
- Where are your biggest obstacles to improving threat hunting within your organization?
- What is the roadmap to achieving a mature threat hunting capability - and what are the organizational requirements to ensure success?
In this interview (see audio link below photo), Ben reflects on common challenges and key findings from the discussion.