target audience: TECH BUYER  Publication date: Mar 2021 - Document type: IDC PlanScape - Doc  Document number: # US47485720

IDC PlanScape: IT Security — Creating A Robust Threat Hunting Capability

By:  Mike Chapple

Content



Related Links

Table of Contents


  • IDC PlanScape Figure

    • Figure: IDC PlanScape: Executive Summary of IT Security for Creating A Robust Threat Hunting Capability

  • Executive Summary

  • Why Is Creating a Robust Threat Hunting Capability Important?

    • Attackers Are Increasingly Sophisticated

    • Computing Environments Are More Complex

    • Most Attacks Go Undetected for Extended Periods of Time

    • Threat Hunting Puts Teeth Behind "Assume You Are Already Compromised"

  • What Is Creating a Robust Threat Hunting Capability?

    • What Do Threat Hunters Search For?

    • Threat Hunting Systematizes and Automates Hunches

    • Figure: Interest in Threat Hunting, 2011–2021

    • Apply Threat Intelligence Solutions in a Practical Way

  • Who Are the Key Stakeholders?

    • Table: Key Stakeholders

  • How Can My Organization Take Advantage of Creating a Robust Threat Hunting Capability?

    • Begin with What You Already Have

    • Use a Risk-Based Approach

    • Don't Operate in a Vacuum

    • Integrate with the Security Operations Center to Increase Visibility

    • Think Like an Attacker

    • Figure: Cyber Kill Chain

    • Consider Using Managed Threat Hunting Services

  • Advice for Technology Leaders

    • Figure: Essential Guidance for Effective Threat Hunting

  • Related Research