Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
    • By Category
      • AI/Hyperautomation
      • Cloud/Cloud Wars
      • Cybersecurity
      • Data
    • By Interest
      • Leadership
      • Office of the CFO
      • Partners Ecosystem
      • Sustainability
    • By Industry
      • Financial Services
      • Healthcare
      • Manufacturing
      • Retail
    • By Type
      • Guidebooks
      • Digital Summits
      • Practitioner Roundtables
      • Practitioner Playlists
    • By Language
      • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
Twitter Instagram
  • CIO Summit
  • Summit NA
  • Dynamics Communities
Twitter LinkedIn
Acceleration Economy
  • Home
  • Cloud Wars
  • Analyst Content
        • By Category
          • AI/Hyperautomation
          • Cloud/Cloud Wars
          • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
          • Data
        • By Interest
          • Leadership
          • Office of the CFO
          • Partners Ecosystem
          • Sustainability
        • By Industry
          • Financial Services
          • Healthcare
          • Manufacturing
          • Retail
        • By Type
          • Guidebooks
          • Digital Summits
          • Practitioner Roundtables
          • Practitioner Playlists
        • By Language
          • Español
  • Vendor Shortlists
    • All Vendors
    • AI/Hyperautomation
    • Cloud
    • Cybersecurity
    • Data
  • What we do
    • Advisory Services
    • Marketing Services
    • Event Services
  • Who we are
    • About Us
    • Practitioner Analysts
  • Subscribe
    • Login / Register
Acceleration Economy
    • Login / Register
Home » Why Attack-Specific Threat Hunting Is Critical for Incident Response
Cybersecurity as a Business Enabler

Why Attack-Specific Threat Hunting Is Critical for Incident Response

Chris HughesBy Chris HughesNovember 15, 2022Updated:November 28, 20223 Mins Read
Facebook Twitter LinkedIn Email
threat hunting incident response
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

You’ve had a data breach or security incident, and that’s bad news. However, on the bright side, now you have concrete insights into the malicious actors’ tactics, techniques, and procedures (TTPs). Your new insights enable you to look across your enterprise environment for other traces of the malicious actors’ activities since they might use the same or similar TTPs. In other words, you’re ready to go threat hunting.

Threat hunting is a proactive exercise to look for cyber threats that are going on undetected in an organization. It is often a hypothesis-driven activity, informed by threat intelligence and information sharing from industry organizations and peers. In our scenario, threat hunting isn’t entirely proactive, since, in it, we’ve already experienced a security incident. In our scenario, threat hunting is not driven by intelligence or information, but by TTPs and Indicators of Compromise (IOCs), which are evidence that the network’s or environment’s security has been compromised; therefore, it’s known as attack-specific threat hunting.

Immediate Response

In the case of attack-specific threat-hunting, organizations should rally their security and technology teams and ensure they understand the attack-specific threat hunting for a specific actor or threat that is underway, as well as the TTPs and IoCs. Note that by utilizing the TTPs and IoCs, your organization can now look at the enterprise and data sources such as logging and user and entity behavior analytics (UEBA) to look for additional traces of the malicious actor activity.

Uncovering Malicious Actor Activity

Malicious actors often tend to persist in an environment, moving laterally across systems and environments. This is after the malicious actor has conducted other steps in the cyber-attack lifecycle such as initial recon, compromise, and establishing a foothold. Armed with the initial reconnaissance and foothold, the malicious actors tend to escalate their privileges and explore other systems to pivot to and ultimately exploit as part of their attack campaign.

Organizations can optimize their tooling and platforms to identify things such as specific traffic flows, file signatures, and other behaviors that indicate further activity by the malicious actor that was observed during the initial incident and breach. This can help them discover other areas of the enterprise where the malicious actor has moved laterally, exploited additional systems, and gained further footholds. It can also help identify additional data that may be at risk, as that is typically what malicious actors are after, either for exfiltration, ransom, or tampering.

It is very possible and even likely that further malicious activity will be discovered. When this occurs, the incident command and associated teams should be alerted so that they can ensure the systems are properly triaged and ultimately remediated. This iterative exercise of attack-specific threat hunting and associated incident response activities will help the organization identify further malicious activity and stomp it out across the enterprise to ensure the threat is fully eliminated, at least to the best of its ability, and that the risk to the organization is addressed.

Final Thoughts

After this attack-specific threat hunting is completed, the organization should also have a much more comprehensive picture of the malicious activity as well as its impact on the organization in totality. This allows the security team and its leadership to properly brief executive leadership on what the organization experienced and how to move forward. This informs activities such as communications, legal, and more, which we are covering in additional articles as part of our series on what to do if you’ve been breached.

CLICK HERE TO JOIN THE CONVERSATION ON LINKEDIN

Want more cybersecurity insights? Subscribe to the Cybersecurity as a Business Enabler channel:

Acceleration Economy Cybersecurity

Cybersecurity data executive featured security security teams
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CISO & Co-Founder
Aquia

Areas of Expertise
  • Cybersecurity
  • LinkedIn

Chris Hughes is an Acceleration Economy Analyst focusing on Cybersecurity. Chris currently serves as the Co-Founder and CISO of Aquia. Chris has nearly 20 years of IT/Cybersecurity experience. This ranges from active duty time with the U.S. Air Force, a Civil Servant with the U.S. Navy and General Services Administration (GSA)/FedRAMP as well as time as a consultant in the private sector. In addition, he also is an Adjunct Professor for M.S. Cybersecurity programs at Capitol Technology University and University of Maryland Global Campus. Chris also participates in industry Working Groups such as the Cloud Security Alliances Incident Response Working Group and serves as the Membership Chair for Cloud Security Alliance D.C. Chris also co-hosts the Resilient Cyber Podcast. Chris holds various industry certifications such as the CISSP/CCSP from ISC2 as holding both the AWS and Azure security certifications. He regularly consults with IT and Cybersecurity leaders from various industries to assist their organizations with their Cloud migration journeys while keeping Security a core component of that transformation.

  Contact Chris Hughes ...

Related Posts

Workday’s Aneel Bhusri: CEOs Optimistic, Why ML’s Hot, His Next Role

March 21, 2023

How OpenAI Increases Accuracy, Personalization With Multimodal GPT-4

March 21, 2023

Why Leaders from Cybersecurity and Data Teams Need Strong Relationships

March 21, 2023

Road to CIO Summit: Why Customers’ AI and Digital Transformation Stories Are So Valuable

March 21, 2023
Add A Comment

Comments are closed.

Recent Posts
  • Workday’s Aneel Bhusri: CEOs Optimistic, Why ML’s Hot, His Next Role
  • How OpenAI Increases Accuracy, Personalization With Multimodal GPT-4
  • Why Leaders from Cybersecurity and Data Teams Need Strong Relationships
  • Road to CIO Summit: Why Customers’ AI and Digital Transformation Stories Are So Valuable
  • Workday Co-CEO Aneel Bhusri One-on-One: Customers, AI/ML, New Role

  • 2X a week
  • Analyst Videos & Articles
  • Exclusive Digital Business Content
This field is for validation purposes and should be left unchanged.
Most Popular Guidebooks

Securing Software-as-a-Service Applications

March 1, 2023

Retail Innovation With AI, Data, and Cybersecurity

March 1, 2023

Cloud Data Strategy, Analytics, and Governance

February 27, 2023

Cloud Wars Top 10 CEO Priorities

February 8, 2023

Advertisement
Acceleration Economy
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Advertising Opportunities
© 2023 Acceleration Economy.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?

Connect with

Login with Google Login with Windowslive

Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.