SlideShare a Scribd company logo
E16-SPGC. This document does not contain technology or Technical Data controlled under either the U.S. International Traffic in Arms
Regulations or the U.S. Export Administration Regulations.
Copyright. Unpublished Work. Raytheon Company.
Customer Success Is Our Mission is a registered trademark of Raytheon Company
[Proactive Security]
Building a Threat
Hunting Program
Presented by:
Carl Manion
Managing Principal
Proactive Threat Hunting
• Proactive Threat Hunting refers to proactively and
iteratively searching through networks or datasets to
detect and respond to advanced threats that evade
traditional rule- or signature-based security
solutions.
• Threat hunting combines the use of threat intelligence,
analytics, and automated security tools with human
smarts.
• Rather than waiting for the inevitable data breach to
happen, proactively scout around for and hunt down
bad actors and malicious activity on your networks.
2
THREAT HUNTING PROGRAM | Key Components
3
1) Starts with Visibility.
2) Tools and Automation are important.
3) Training is critically important.
4) Requires skilled, experienced
analysts, engineers, and incident
responders.
5) Metrics are important.
6) Intelligence is more than a buzzword.
VISIBILITY
TOOLSMETRICS
TALENT TRAINING
INTELLIGENCE
1
2
34
5
6
THREAT HUNTING PROGRAM | Visibility
• Network traffic, hosts, end-points, logs, threats
• Must be able to easily pivot and build timelines
• Hunting can be time consuming, so access and
performance must be part of your key considerations
• Investigation directly supports detection and response
4
1
THREAT HUNTING PROGRAM | Tools & Automation
• SIEM
• NMS / IDS / IPS
• EDR
• Threat “Intelligence” Feeds/Platform/Services
• SOC Orchestration / Workflow Automation
• Overall, requires platforms more than tools; let the
smart humans define what they need to see
5
2
THREAT HUNTING PROGRAM | Training
• Define the results for the skills or capabilities you hope to
attain
• Outline training plans / topics / objectives; align with threat
hunting strategy and plans
• Mentoring / Teaming / On-the-job training (OJT)
• Informal training counts too!
• List job/role related training expectations of staff
• Remember to account for training costs; timeframes;
schedules
6
3
• Well rounded individuals
• Driven / Motivated to learn
• Analytical mind, able to apply
concepts and approaches to
variety of different toolsets
• Able to think like adversary;
can transition between
defensive/offensive mindset
• Train, train, train!
7
THREAT HUNTING PROGRAM | Skills (Talent)
Responds to Alarms. Searches for Clues.
4
THREAT HUNTING PROGRAM | Metrics
• Attack “Dwell Time”
– What is it? Lifespan of an Attack; How long the attacker was in your
environment.
– Why it matters: The longer the attacker has to operate in your
environment, the more damage they can do.
– The goal is to reduce dwell time as much as possible, so attackers do
not have time to achieve lateral movement and remove critical data.
• Mean Time to Detection
– What is it? The mean (average) time it takes to detect malicious or
anomalous activity within an environment.
– Why it matters: Identifying and containing an attacker, as quickly as
possible, is of paramount importance to minimize damage.
8
Focus Areas To Reduce Dwell Time:
1. Fundamental security controls
2. Granular visibility and correlated
intelligence
3. Continuous endpoint monitoring
4. Actionable prediction of human behavior
5. User awareness (user behavior analysis)
5
Examples:
9
THREAT HUNTING PROGRAM | Intelligence
6
• Buzzword within the industry; includes wide range (from malware
analysis to traffic monitoring, to open source, or specific info from solution
vendors, etc.)
• The more granular, the better (need IPs, protocols, port numbers, domain
names URLs, etc.)
• Must be updated regularly (must be valid, relevant and timely)
• Must have context to be actionable and to provide value to your threat
hunting
• Helps maximize the effectiveness of your security resources by allowing
them to focus their time on the highest risk areas and high priority events
• Focus more on TTPs and trends, rather than specific IoCs; think about
how it may relate to known/on-going attack campaigns
The use of information
collection and analysis to
provide guidance and direction
to threat hunters in support of
their theories and decisions.
1) Too much reliance on “hunting tools” or any singular
data type:
Logs lie
Endpoint security tools miss things
Vendors can’t fully automate hunting
2) Alert-centric workflows
3) Open loop processes
4) Bias and fatigue (mix it up to keep the work interesting)
5) Failure to keep up with latest news / intelligence
10
THREAT HUNTING PROGRAM | Risks
COMPREHENSIVE APPROACH:
 Network, host, and log data
 Cyclical / Closed Loop Approach
 Begin with a question, theory, or metric and work toward answering
that question through research and proactive hunting.
 Build repeatable process workflows and queries back into your tools,
through custom content, as you learn.
 Seek to reduce mean-time-to-detection and response; find intrusions
and compromises more quickly, and earlier in the cyber attack chain
 Train. Change it up. Train some more. Repeat.
 Continuous learning; Revisit investigations and hunting techniques!
11
THREAT HUNTING PROGRAM | Summary
2/10/2017 12

More Related Content

PPTX
Cyber Threat Hunting with Phirelight
PPTX
What is Threat Hunting? - Panda Security
PPTX
Threat hunting and achieving security maturity
PPTX
Bsides 2019 - Intelligent Threat Hunting
PPTX
Threat hunting - Every day is hunting season
PDF
Threat hunting 101 by Sandeep Singh
PDF
Telesoft Cyber Threat Hunting Infographic
PPTX
Threat Hunting 101: Intro to Threat Detection and Incident Response
Cyber Threat Hunting with Phirelight
What is Threat Hunting? - Panda Security
Threat hunting and achieving security maturity
Bsides 2019 - Intelligent Threat Hunting
Threat hunting - Every day is hunting season
Threat hunting 101 by Sandeep Singh
Telesoft Cyber Threat Hunting Infographic
Threat Hunting 101: Intro to Threat Detection and Incident Response

What's hot (20)

PPTX
Abstract Tools for Effective Threat Hunting
PPTX
Cyber Threat Hunting: Identify and Hunt Down Intruders
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PDF
Threat Hunting Procedures and Measurement Matrice
PDF
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
PPTX
Threat Hunting - Moving from the ad hoc to the formal
PDF
Threat Hunting
PDF
Threat Hunting Report
PDF
Building a Threat Hunting Practice in the Cloud
PDF
TTPs for Threat hunting In Oil Refineries
PDF
SIEM and Threat Hunting
PPTX
SOC2016 - The Investigation Labyrinth
PPTX
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
PDF
Threat Hunting 102: Beyond the Basics
PPTX
Cyber Threat Hunting Training (CCTHP)
PDF
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PPTX
Threat hunting on the wire
PPTX
Cyber Threat Intelligence: Building and maturing an intelligence program that...
PPTX
Cyber Incident Response Triage - CPX 360 Presentation
Abstract Tools for Effective Threat Hunting
Cyber Threat Hunting: Identify and Hunt Down Intruders
Effective Threat Hunting with Tactical Threat Intelligence
Threat Hunting Procedures and Measurement Matrice
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting
Threat Hunting Report
Building a Threat Hunting Practice in the Cloud
TTPs for Threat hunting In Oil Refineries
SIEM and Threat Hunting
SOC2016 - The Investigation Labyrinth
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Threat Hunting 102: Beyond the Basics
Cyber Threat Hunting Training (CCTHP)
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
PHDays 2018 Threat Hunting Hands-On Lab
Threat hunting on the wire
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Incident Response Triage - CPX 360 Presentation
Ad

Viewers also liked (20)

PDF
Workshop threat-hunting
PDF
Threat Hunting Workshop
PPTX
Threat Hunting with Splunk
PDF
Threat Hunting with Splunk
PPTX
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
PPTX
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
PPTX
Hunting on the cheap
PDF
Building an Analytics Enables SOC
PPTX
Threat Hunting with Splunk
PPTX
Splunk for Developers Breakout Session
PDF
Windows Threat Hunting
PPTX
Splunk for Security - Hands-On
PDF
PDF
A Threat Hunter Himself
PPTX
The Diamond Model for Intrusion Analysis - Threat Intelligence
PDF
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
PPTX
44CON London 2015: NTFS Analysis with PowerForensics
PDF
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
PDF
Full_Article_GadgetTrak_Forbes_Reduced
PDF
How to prevent cyber attack with big data & intelligence(sfis170222)
Workshop threat-hunting
Threat Hunting Workshop
Threat Hunting with Splunk
Threat Hunting with Splunk
BSidesLV 2016 - Powershell - Hunting on the Endpoint - Gerritz
Hunting: Defense Against The Dark Arts - BSides Philadelphia - 2016
Hunting on the cheap
Building an Analytics Enables SOC
Threat Hunting with Splunk
Splunk for Developers Breakout Session
Windows Threat Hunting
Splunk for Security - Hands-On
A Threat Hunter Himself
The Diamond Model for Intrusion Analysis - Threat Intelligence
NTXISSACSC4 - Identity as a Threat Plane Leveraging UEBA and IdA
44CON London 2015: NTFS Analysis with PowerForensics
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
Full_Article_GadgetTrak_Forbes_Reduced
How to prevent cyber attack with big data & intelligence(sfis170222)
Ad

Similar to Building a Successful Threat Hunting Program (20)

PPTX
Threat intelligence life cycle steps by steps
PDF
7 Habits of Smart Threat Intelligence Analysts
PPTX
Ethical Hacking Definitions Matter - Covering Vulnerability Scanning, Vulnera...
PDF
Cyber Threat Hunting Workshop.pdf
PDF
Cyber Threat Hunting Workshop.pdf
PDF
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
PPTX
Chapter I Introduction To Cyber Intelligence.pptx
PPTX
Cyber Threat Hunting Workshop
PPTX
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
PPTX
Security Operations Center Analyst Presentation
PPTX
My Keynote from BSidesTampa 2015 (video in description)
PDF
Enhancing Cyber threat hunting for your team | 2021
PPTX
Ethical hacking
PPTX
Your cyber security webinar
PPTX
Introduction to Ethical Hacking
PPTX
Data Connectors San Antonio Cybersecurity Conference 2018
PPTX
How To Build An Incident Response Function
PPTX
Introduction to Threat Hunting in an SOC
PPTX
Cybersecurity-Real World Approach FINAL 2-24-16
PPTX
Unit-1&2,mdngmnd,mngmdnmgnmdnfmngdf.pptx
Threat intelligence life cycle steps by steps
7 Habits of Smart Threat Intelligence Analysts
Ethical Hacking Definitions Matter - Covering Vulnerability Scanning, Vulnera...
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
2020 11-15 marcin ludwiszewski - purple, red, blue and others - rainbow team...
Chapter I Introduction To Cyber Intelligence.pptx
Cyber Threat Hunting Workshop
NTXISSACSC2 - Top Ten Trends in TRM by Jon Murphy
Security Operations Center Analyst Presentation
My Keynote from BSidesTampa 2015 (video in description)
Enhancing Cyber threat hunting for your team | 2021
Ethical hacking
Your cyber security webinar
Introduction to Ethical Hacking
Data Connectors San Antonio Cybersecurity Conference 2018
How To Build An Incident Response Function
Introduction to Threat Hunting in an SOC
Cybersecurity-Real World Approach FINAL 2-24-16
Unit-1&2,mdngmnd,mngmdnmgnmdnfmngdf.pptx

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Cloud computing and distributed systems.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPT
Teaching material agriculture food technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
cuic standard and advanced reporting.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Dropbox Q2 2025 Financial Results & Investor Presentation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Cloud computing and distributed systems.
Building Integrated photovoltaic BIPV_UPV.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation_ Review paper, used for researhc scholars
Teaching material agriculture food technology
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Weekly Chronicles - August'25 Week I
Spectral efficient network and resource selection model in 5G networks
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The Rise and Fall of 3GPP – Time for a Sabbatical?
Network Security Unit 5.pdf for BCA BBA.
cuic standard and advanced reporting.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Advanced methodologies resolving dimensionality complications for autism neur...

Building a Successful Threat Hunting Program

  • 1. E16-SPGC. This document does not contain technology or Technical Data controlled under either the U.S. International Traffic in Arms Regulations or the U.S. Export Administration Regulations. Copyright. Unpublished Work. Raytheon Company. Customer Success Is Our Mission is a registered trademark of Raytheon Company [Proactive Security] Building a Threat Hunting Program Presented by: Carl Manion Managing Principal
  • 2. Proactive Threat Hunting • Proactive Threat Hunting refers to proactively and iteratively searching through networks or datasets to detect and respond to advanced threats that evade traditional rule- or signature-based security solutions. • Threat hunting combines the use of threat intelligence, analytics, and automated security tools with human smarts. • Rather than waiting for the inevitable data breach to happen, proactively scout around for and hunt down bad actors and malicious activity on your networks. 2
  • 3. THREAT HUNTING PROGRAM | Key Components 3 1) Starts with Visibility. 2) Tools and Automation are important. 3) Training is critically important. 4) Requires skilled, experienced analysts, engineers, and incident responders. 5) Metrics are important. 6) Intelligence is more than a buzzword. VISIBILITY TOOLSMETRICS TALENT TRAINING INTELLIGENCE 1 2 34 5 6
  • 4. THREAT HUNTING PROGRAM | Visibility • Network traffic, hosts, end-points, logs, threats • Must be able to easily pivot and build timelines • Hunting can be time consuming, so access and performance must be part of your key considerations • Investigation directly supports detection and response 4 1
  • 5. THREAT HUNTING PROGRAM | Tools & Automation • SIEM • NMS / IDS / IPS • EDR • Threat “Intelligence” Feeds/Platform/Services • SOC Orchestration / Workflow Automation • Overall, requires platforms more than tools; let the smart humans define what they need to see 5 2
  • 6. THREAT HUNTING PROGRAM | Training • Define the results for the skills or capabilities you hope to attain • Outline training plans / topics / objectives; align with threat hunting strategy and plans • Mentoring / Teaming / On-the-job training (OJT) • Informal training counts too! • List job/role related training expectations of staff • Remember to account for training costs; timeframes; schedules 6 3
  • 7. • Well rounded individuals • Driven / Motivated to learn • Analytical mind, able to apply concepts and approaches to variety of different toolsets • Able to think like adversary; can transition between defensive/offensive mindset • Train, train, train! 7 THREAT HUNTING PROGRAM | Skills (Talent) Responds to Alarms. Searches for Clues. 4
  • 8. THREAT HUNTING PROGRAM | Metrics • Attack “Dwell Time” – What is it? Lifespan of an Attack; How long the attacker was in your environment. – Why it matters: The longer the attacker has to operate in your environment, the more damage they can do. – The goal is to reduce dwell time as much as possible, so attackers do not have time to achieve lateral movement and remove critical data. • Mean Time to Detection – What is it? The mean (average) time it takes to detect malicious or anomalous activity within an environment. – Why it matters: Identifying and containing an attacker, as quickly as possible, is of paramount importance to minimize damage. 8 Focus Areas To Reduce Dwell Time: 1. Fundamental security controls 2. Granular visibility and correlated intelligence 3. Continuous endpoint monitoring 4. Actionable prediction of human behavior 5. User awareness (user behavior analysis) 5 Examples:
  • 9. 9 THREAT HUNTING PROGRAM | Intelligence 6 • Buzzword within the industry; includes wide range (from malware analysis to traffic monitoring, to open source, or specific info from solution vendors, etc.) • The more granular, the better (need IPs, protocols, port numbers, domain names URLs, etc.) • Must be updated regularly (must be valid, relevant and timely) • Must have context to be actionable and to provide value to your threat hunting • Helps maximize the effectiveness of your security resources by allowing them to focus their time on the highest risk areas and high priority events • Focus more on TTPs and trends, rather than specific IoCs; think about how it may relate to known/on-going attack campaigns The use of information collection and analysis to provide guidance and direction to threat hunters in support of their theories and decisions.
  • 10. 1) Too much reliance on “hunting tools” or any singular data type: Logs lie Endpoint security tools miss things Vendors can’t fully automate hunting 2) Alert-centric workflows 3) Open loop processes 4) Bias and fatigue (mix it up to keep the work interesting) 5) Failure to keep up with latest news / intelligence 10 THREAT HUNTING PROGRAM | Risks
  • 11. COMPREHENSIVE APPROACH:  Network, host, and log data  Cyclical / Closed Loop Approach  Begin with a question, theory, or metric and work toward answering that question through research and proactive hunting.  Build repeatable process workflows and queries back into your tools, through custom content, as you learn.  Seek to reduce mean-time-to-detection and response; find intrusions and compromises more quickly, and earlier in the cyber attack chain  Train. Change it up. Train some more. Repeat.  Continuous learning; Revisit investigations and hunting techniques! 11 THREAT HUNTING PROGRAM | Summary

Editor's Notes

  • #8: Roles: Threat Analyst, Intrusion Analyst, Incident Handler