Introduction to Pro-Active Intruder Hunting, Part 1


It is a common axiom of cyber security wisdom that it is not a question of if an organization’s defenses will be breached, but only a question of when. Further, while cyber-attacks and data breaches are always business disrupting, they can also be very costly. Therefore, Time to Detection and Time to Effective Respond have become critical measurements for the success of any organization’s cyber security program.  An effective and proactive Intruder Hunting Program, combined with a well-planned cyber response, can help stop cyber-attacks before they become business disrupting events and should be a cornerstone of any Enterprise Cyber Security Program. 

Listen to Part 1 of our Intruder Hunting Webinar Series to Discover: 

  • The Goals of Intruder Hunting and how it differs from Threat Hunting
  • The resources required for an Intruder Hunting Program
  • The functional components of an Intruder Hunting Program
  • How to use “Negative Outcome Scenarios” and an “Evidence Prediction Process” to isolate the Huntscape and create a data collection plan
  • What are the “sensor” tools available for free

Introduction to Pro-Active Intruder Hunting, Part 1


Introduction to Pro-Active Intruder Hunting, Part 1

Register for Part 1 of our on-demand webinar series with Bruce A. Roton, VP and Global Head of Customer Success at CyberProof. Then,  join us for Part 2 where we'll delve deeper into the issues and processes of intruder detection, from first response through intruder eviction and remediation.

Bruce A. Roton, CISSP, CISA, CISM, CIPP/US, C|EH, C|CISO, CRISC, ISO-27001, CGEIT, CSSGB(IT), ITIL, CSMCP, has over 40 years of experience in Network and Security services, bringing a wealth of knowledge to this series. Don't miss out on taking part of the live conversation.