IUWorld Cybersecurity Governance, Risk & Compliance Part I
Part I: Demystifying Cyber Health and Cyber Threat Hunting Watch Video JEFF: Welcome to Cloud Expo, can you please help explain what cyber threat hunting is? SNEHAL: Jeff, thanks for hosting us. First let’s talk to what a cyber threat is -– someone is trying to take your data by breaking into your critical digital systems. Let me describe three types: A threat can be an IP address from a hacker country, and that traffic is a sign of a breach. A threat can be someone breaking into your email systems and stealing identities, now they can gain more access to other systems. A threat can be someone that removes data from critical servers—and now you have a ransomware issue. JEFF: So are you saying that cyber threat hunting is a practice of seeing a very complex attack and stopping it before real damage is done? SNEHAL: correct Jeff, and threat hunting needs more than SIEM logs. You need network traffic, behavior a...