
Sign up to save your podcasts
Or


Host Dave Johnson and co-host Tyler Zito sit down with Sydney Marrone and Lauren Proehl, co-founders of the THOR Collective, to explore the evolving world of threat hunting. This conversation covers the fundamentals of building a threat hunting program, how AI is transforming both offensive and defensive security, and the importance of community collaboration in advancing the practice of "thrunting."
Key topics & timestamps
What is the THOR Collective? (5:27 - 9:29)
Evolution of threat hunting (9:38 - 11:55)
AI's impact on threat hunting (12:07 - 15:44)
How to start a threat hunting program (15:44 - 21:15)
Proving value and storytelling (24:05 - 28:14)
Documentation and process (31:33 - 36:14)
Key quotes
"If you ask three people what threat hunting is, you'll get three different answers." - Dave Johnson
"The barrier to entry [to threat hunting] is going to be a lot lower, which is great, as long as people aren't relying on [AI] way too much." - Sydney Marrone
"Every single hunt should have an output... It's very hard to fail at threat hunting—you always find something." - Lauren Proehl
"If it isn't documented, it didn't happen." - Lauren Proehl
"The only way we win this is doing this together." - Lauren Proehl
Helpful links
Production Credits
Connect
The Job Security Podcast explores the unique perspectives and stories of the people who make the cybersecurity industry what it is, whether they realize it or not.
By Expel MDRHost Dave Johnson and co-host Tyler Zito sit down with Sydney Marrone and Lauren Proehl, co-founders of the THOR Collective, to explore the evolving world of threat hunting. This conversation covers the fundamentals of building a threat hunting program, how AI is transforming both offensive and defensive security, and the importance of community collaboration in advancing the practice of "thrunting."
Key topics & timestamps
What is the THOR Collective? (5:27 - 9:29)
Evolution of threat hunting (9:38 - 11:55)
AI's impact on threat hunting (12:07 - 15:44)
How to start a threat hunting program (15:44 - 21:15)
Proving value and storytelling (24:05 - 28:14)
Documentation and process (31:33 - 36:14)
Key quotes
"If you ask three people what threat hunting is, you'll get three different answers." - Dave Johnson
"The barrier to entry [to threat hunting] is going to be a lot lower, which is great, as long as people aren't relying on [AI] way too much." - Sydney Marrone
"Every single hunt should have an output... It's very hard to fail at threat hunting—you always find something." - Lauren Proehl
"If it isn't documented, it didn't happen." - Lauren Proehl
"The only way we win this is doing this together." - Lauren Proehl
Helpful links
Production Credits
Connect
The Job Security Podcast explores the unique perspectives and stories of the people who make the cybersecurity industry what it is, whether they realize it or not.