SANS 2018 Threat Hunting Report

Overview

How are organizations preparing their environments for hunting? How are they accessing their critical data needed in a hunt? And how are they using the threat and operational data uncovered during the hunt? This, SANS third survey on threat hunting, looks at maturity of hunting programs and where they are going, along with best practices being used in organizations to detect and remediate threats that would otherwise remain hidden.

Key Takeaways

  • Whether or not organizations are preparing for threat hunting with advanced planning, assessments, procedures and technical integrations
  • What prerequisites organizations should consider in preparing for a hunt
  • What data hunters need to access, how they are accessing it and usefulness of that data
  • Who does the hunting, who should do the hunting and whether or not hunting activities are coordinated across detection and response
  • Whether or not organizations are deploying continuous hunting to proactively look for threats, or simply following up on indicators

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language