Cybersecurity FOREVER

Day-379: What is Threat Hunting Maturity Model?


Listen Later

Today I will discuss:1. What is Threat Hunting?Gateway ⛩ to become Skilled-Cybersecurity Professional 🕴🕴🕴 https://luminisindia.com/goehm--Many organizations are quickly discovering that threat hunting is the next step in the evolution of the modern SOC, but they remain unsure of how to start threat-hunting or how far along they are in developing their own hunt capabilities. So, the question is --How can you quantify where your organization stands on the road to effective hunting?Here, we will discuss a general model that can map threat-hunting maturity across any organization.📌📌📌What is Threat Hunting?📌📌📌It the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.It is not something which can be automated fully. Instead, Threat Hunting is more 'manual' or 'Machine-assisted'. In fact, one of the chief goals of hunting should be to improve your automated detection capabilities by prototyping new ways to detect malicious activity and turning those prototypes into production detection capabilities.📌📌📌Hunting Maturity Model📌📌📌There are three factors to consider when judging an organization’s hunting ability:✅ The quantity and quality of the data they collect;✅ In what ways they can visualize and analyze various types of data;✅ What kinds of automated analytic they can apply to data to enhance analyst insightsEvaluation is needed in any methodological operation to evaluate the maturity of your threat hunting you can use the “Hunting Maturity Model (HMM)” which gives you a set level to help you locate your enterprise threat hunting model posture according to four levels:🔹 Level 0: Initial🔹 Level 1: Minimal🔹 Level 2: Procedural🔹 Level 3: Innovative🔹 Level 4: Leading--_

Do you want to become a Skilled-Cybersecurity Professional 🕴🕴🕴.Here is the gateway ⛩  https://luminisindia.com/goehm

 

How to perform a 🔥🔥PENTESTING🔥🔥???🎯🎯 A Pentesting Mini Project🎯🎯

https://www.youtube.com/watch?v=84gNIEmCEAA

 

If you find the video content informative, please Like thevideo and 📣📣📣 share with your friends.Help your friends to understand cybersecurity. Also let me know of ✍✍✍what do you think of this video.

Thanks,

 

Meena R.

Your 'Cyber Warrior' Friend

_

YOU CAN FOLLOW ME AT: 

Facebook Page : https://www.facebook.com/cybersec.prism

Instagram:  https://www.instagram.com/meena.cyber.warrior/

Linkedin Profile: https://www.linkedin.com/in/meena1/

About ME: https://www.youtube.com/watch?v=T66K3K5Y2tI

YouTube Channel: https://www.youtube.com/@cybersecurityforever8214

Hear My Podcast: https://anchor.fm/meena-r

Linkedin Page : Cybersecurity Prism https://www.linkedin.com/company/10117131/

Facebook Group : Cybersecurity Forever https://www.facebook.com/groups/cybersec.forever/

**

Here are more resources:

**

-

Cybersecurity HIGHLY informative articles for cybersecurityenthusiastic 🚀🚀🚀 (cyber-warrior)

_

https://luminisindia.com/cybersecurity-prism

_

You can also watch 👀 all the videos ofCybersecurity Series there:

_

Facebook Page : 👉👉👉  Cybersecurity Prismhttps://www.facebook.com/cybersec.prism/

YouTube : https://www.youtube.com/@cybersecurityforever8214

_

Gateway ⛩ to Cybersecurity

--

https://luminisindia.com/goehm

_

The new Cyber Warrior's Command Guide For Ethical Hackers tohelp you learn faster...

_

✅ Grab a FREE Command Guide here:https://luminisindia.com/getcgeh

_

Are you willing to learn Networking now?

Would you like to watch some videos of Networking, CCNARouting & Switching, etc?

_

https://luminisindia.com/networking-free

_

❓ Do you want to have thecomplete set of my CCNA Security powerpoint PRESENTATIONS ❓

--

https://luminisindia.com/free-ccna-security-presentations

_

...more
View all episodesView all episodes
Download on the App Store

Cybersecurity FOREVERBy Meena R


More shows like Cybersecurity FOREVER

View all
David Bombal by David Bombal

David Bombal

21 Listeners