Artwork

תוכן מסופק על ידי Team Cymru. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Team Cymru או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.
Player FM - אפליקציית פודקאסט
התחל במצב לא מקוון עם האפליקציה Player FM !

T. Rowe Price’s Matthew Winters on Threat Hunting as the Scientific Method

19:56
 
שתפו
 

Manage episode 449121245 series 3505151
תוכן מסופק על ידי Team Cymru. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Team Cymru או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.

In our latest episode of the Future of Threat Intelligence podcast, David speaks with Matthew Winters, Lead Threat Hunter at T. Rowe Price. Matthew shares his unconventional journey into cybersecurity, highlighting the importance of soft skills and creativity in threat hunting that he has picked up along the way.

He explains that threat hunting is akin to applying the scientific method to networks, starting with hypotheses rather than alerts. Matthew and David also explore the critical role of threat intelligence in shaping effective hunting strategies and the essential skills needed to build a successful threat hunting team. Tune in for valuable insights on enhancing your cybersecurity posture!

Topics discussed:

  • Threat hunting as applying the scientific method, starting with hypotheses instead of relying solely on alerts.
  • The importance of threat intelligence as a foundational element for effective threat hunting and proactive defense strategies.
  • Key skills for threat hunters include technical knowledge, creativity, and the ability to reassess and redefine problem statements.
  • A hybrid approach to data analysis is recommended, utilizing both network and endpoint data for comprehensive threat visibility.
  • The challenges of measuring threat hunting effectiveness, and suggestions for metrics like defenses created and impact on adversaries.

Key Takeaways:

  • Explore veteran programs to facilitate career transitions into cybersecurity, leveraging the unique skills and experiences of military personnel.
  • Adopt the scientific method in threat hunting by formulating hypotheses before analyzing data, ensuring a structured approach to investigations.
  • Utilize threat intelligence to inform your threat hunting strategies, focusing on real-world adversary behaviors and techniques relevant to your organization.
  • Encourage creativity within your team by identifying individuals with a "MacGyver Drive" who can think outside the box to solve complex problems.
  • Implement a hybrid data analysis approach by integrating both network and endpoint data to gain comprehensive visibility into potential threats.
  • Define clear boundaries between threat hunting, incident response, and red teaming to maintain focus and effectiveness in each discipline.
  • Measure the effectiveness of your threat hunting program by tracking metrics such as defenses created and the impact on adversaries.
  • Foster a culture of continuous learning within your threat hunting team to enhance skills and adapt to evolving cybersecurity challenges.
  • Leverage tools like graph databases to analyze relationships between threats and improve the precision of your hunting efforts.
  • Challenge your team to reassess problem statements regularly, ensuring they are asking the right questions to drive effective threat hunting.
  continue reading

67 פרקים

Artwork
iconשתפו
 
Manage episode 449121245 series 3505151
תוכן מסופק על ידי Team Cymru. כל תוכן הפודקאסטים כולל פרקים, גרפיקה ותיאורי פודקאסטים מועלים ומסופקים ישירות על ידי Team Cymru או שותף פלטפורמת הפודקאסט שלהם. אם אתה מאמין שמישהו משתמש ביצירה שלך המוגנת בזכויות יוצרים ללא רשותך, אתה יכול לעקוב אחר התהליך המתואר כאן https://he.player.fm/legal.

In our latest episode of the Future of Threat Intelligence podcast, David speaks with Matthew Winters, Lead Threat Hunter at T. Rowe Price. Matthew shares his unconventional journey into cybersecurity, highlighting the importance of soft skills and creativity in threat hunting that he has picked up along the way.

He explains that threat hunting is akin to applying the scientific method to networks, starting with hypotheses rather than alerts. Matthew and David also explore the critical role of threat intelligence in shaping effective hunting strategies and the essential skills needed to build a successful threat hunting team. Tune in for valuable insights on enhancing your cybersecurity posture!

Topics discussed:

  • Threat hunting as applying the scientific method, starting with hypotheses instead of relying solely on alerts.
  • The importance of threat intelligence as a foundational element for effective threat hunting and proactive defense strategies.
  • Key skills for threat hunters include technical knowledge, creativity, and the ability to reassess and redefine problem statements.
  • A hybrid approach to data analysis is recommended, utilizing both network and endpoint data for comprehensive threat visibility.
  • The challenges of measuring threat hunting effectiveness, and suggestions for metrics like defenses created and impact on adversaries.

Key Takeaways:

  • Explore veteran programs to facilitate career transitions into cybersecurity, leveraging the unique skills and experiences of military personnel.
  • Adopt the scientific method in threat hunting by formulating hypotheses before analyzing data, ensuring a structured approach to investigations.
  • Utilize threat intelligence to inform your threat hunting strategies, focusing on real-world adversary behaviors and techniques relevant to your organization.
  • Encourage creativity within your team by identifying individuals with a "MacGyver Drive" who can think outside the box to solve complex problems.
  • Implement a hybrid data analysis approach by integrating both network and endpoint data to gain comprehensive visibility into potential threats.
  • Define clear boundaries between threat hunting, incident response, and red teaming to maintain focus and effectiveness in each discipline.
  • Measure the effectiveness of your threat hunting program by tracking metrics such as defenses created and the impact on adversaries.
  • Foster a culture of continuous learning within your threat hunting team to enhance skills and adapt to evolving cybersecurity challenges.
  • Leverage tools like graph databases to analyze relationships between threats and improve the precision of your hunting efforts.
  • Challenge your team to reassess problem statements regularly, ensuring they are asking the right questions to drive effective threat hunting.
  continue reading

67 פרקים

כל הפרקים

×
 
Loading …

ברוכים הבאים אל Player FM!

Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.

 

מדריך עזר מהיר