The Gamer Theory of Threat Hunting

Threat Hunting is Not Simply a Compromise Assessment or Continuous Security Monitoring

Published January 2019


A Unique Approach for Effective Defense, “Hackers can complete an entire data breach in under 15 hours, which includes exfiltrating data,” according to a recent industry report.

In a multi-layered stack of security tools, it becomes a game of peeling or stripping back layers to find the core infection layer. When looking for the unknown infection or attack vector in your enterprise ecosystem, many organizations are shifting to iterative hunting exercises based around intelligence operations. There are three key concepts hunt gamers in an organization should focus on:

• Assuming the compromise of assets
• Examining stealthy compromise and breaches in all phases of an attack
• Thinking and reacting like an adversary

Get the paper and gamify your threat hunting!

You will have to register, or log in, in order to download this paper.

Biting the hand that feeds IT © 1998–2019