Artwork

内容由Team Cymru提供。所有播客内容(包括剧集、图形和播客描述)均由 Team Cymru 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal
Player FM -播客应用
使用Player FM应用程序离线!

T. Rowe Price’s Matthew Winters on Threat Hunting as the Scientific Method

19:56
 
分享
 

Manage episode 449118029 series 3505153
内容由Team Cymru提供。所有播客内容(包括剧集、图形和播客描述)均由 Team Cymru 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

In our latest episode of the Future of Threat Intelligence podcast, David speaks with Matthew Winters, Lead Threat Hunter at T. Rowe Price. Matthew shares his unconventional journey into cybersecurity, highlighting the importance of soft skills and creativity in threat hunting that he has picked up along the way.

He explains that threat hunting is akin to applying the scientific method to networks, starting with hypotheses rather than alerts. Matthew and David also explore the critical role of threat intelligence in shaping effective hunting strategies and the essential skills needed to build a successful threat hunting team. Tune in for valuable insights on enhancing your cybersecurity posture!

Topics discussed:

  • Threat hunting as applying the scientific method, starting with hypotheses instead of relying solely on alerts.
  • The importance of threat intelligence as a foundational element for effective threat hunting and proactive defense strategies.
  • Key skills for threat hunters include technical knowledge, creativity, and the ability to reassess and redefine problem statements.
  • A hybrid approach to data analysis is recommended, utilizing both network and endpoint data for comprehensive threat visibility.
  • The challenges of measuring threat hunting effectiveness, and suggestions for metrics like defenses created and impact on adversaries.

Key Takeaways:

  • Explore veteran programs to facilitate career transitions into cybersecurity, leveraging the unique skills and experiences of military personnel.
  • Adopt the scientific method in threat hunting by formulating hypotheses before analyzing data, ensuring a structured approach to investigations.
  • Utilize threat intelligence to inform your threat hunting strategies, focusing on real-world adversary behaviors and techniques relevant to your organization.
  • Encourage creativity within your team by identifying individuals with a "MacGyver Drive" who can think outside the box to solve complex problems.
  • Implement a hybrid data analysis approach by integrating both network and endpoint data to gain comprehensive visibility into potential threats.
  • Define clear boundaries between threat hunting, incident response, and red teaming to maintain focus and effectiveness in each discipline.
  • Measure the effectiveness of your threat hunting program by tracking metrics such as defenses created and the impact on adversaries.
  • Foster a culture of continuous learning within your threat hunting team to enhance skills and adapt to evolving cybersecurity challenges.
  • Leverage tools like graph databases to analyze relationships between threats and improve the precision of your hunting efforts.
  • Challenge your team to reassess problem statements regularly, ensuring they are asking the right questions to drive effective threat hunting.
  continue reading

69集单集

Artwork
icon分享
 
Manage episode 449118029 series 3505153
内容由Team Cymru提供。所有播客内容(包括剧集、图形和播客描述)均由 Team Cymru 或其播客平台合作伙伴直接上传和提供。如果您认为有人在未经您许可的情况下使用您的受版权保护的作品,您可以按照此处概述的流程进行操作https://zh.player.fm/legal

In our latest episode of the Future of Threat Intelligence podcast, David speaks with Matthew Winters, Lead Threat Hunter at T. Rowe Price. Matthew shares his unconventional journey into cybersecurity, highlighting the importance of soft skills and creativity in threat hunting that he has picked up along the way.

He explains that threat hunting is akin to applying the scientific method to networks, starting with hypotheses rather than alerts. Matthew and David also explore the critical role of threat intelligence in shaping effective hunting strategies and the essential skills needed to build a successful threat hunting team. Tune in for valuable insights on enhancing your cybersecurity posture!

Topics discussed:

  • Threat hunting as applying the scientific method, starting with hypotheses instead of relying solely on alerts.
  • The importance of threat intelligence as a foundational element for effective threat hunting and proactive defense strategies.
  • Key skills for threat hunters include technical knowledge, creativity, and the ability to reassess and redefine problem statements.
  • A hybrid approach to data analysis is recommended, utilizing both network and endpoint data for comprehensive threat visibility.
  • The challenges of measuring threat hunting effectiveness, and suggestions for metrics like defenses created and impact on adversaries.

Key Takeaways:

  • Explore veteran programs to facilitate career transitions into cybersecurity, leveraging the unique skills and experiences of military personnel.
  • Adopt the scientific method in threat hunting by formulating hypotheses before analyzing data, ensuring a structured approach to investigations.
  • Utilize threat intelligence to inform your threat hunting strategies, focusing on real-world adversary behaviors and techniques relevant to your organization.
  • Encourage creativity within your team by identifying individuals with a "MacGyver Drive" who can think outside the box to solve complex problems.
  • Implement a hybrid data analysis approach by integrating both network and endpoint data to gain comprehensive visibility into potential threats.
  • Define clear boundaries between threat hunting, incident response, and red teaming to maintain focus and effectiveness in each discipline.
  • Measure the effectiveness of your threat hunting program by tracking metrics such as defenses created and the impact on adversaries.
  • Foster a culture of continuous learning within your threat hunting team to enhance skills and adapt to evolving cybersecurity challenges.
  • Leverage tools like graph databases to analyze relationships between threats and improve the precision of your hunting efforts.
  • Challenge your team to reassess problem statements regularly, ensuring they are asking the right questions to drive effective threat hunting.
  continue reading

69集单集

所有剧集

×
 
Loading …

欢迎使用Player FM

Player FM正在网上搜索高质量的播客,以便您现在享受。它是最好的播客应用程序,适用于安卓、iPhone和网络。注册以跨设备同步订阅。

 

快速参考指南

边探索边听这个节目
播放