ID.RA-03.157

Does your organization conduct regular threat hunting activities to proactively identify potential threat actors in your environment?

Explanation

Threat hunting involves proactively searching through networks, endpoints, and datasets to detect malicious activities or indicators of compromise that may have evaded existing security solutions. This practice helps identify advanced persistent threats, insider threats, or zero-day exploits that automated tools might miss. Effective threat hunting combines automated tools with human analysis to investigate anomalies, unusual patterns, or suspicious behaviors. Evidence of threat hunting could include documented threat hunting procedures, reports from previous threat hunting exercises showing methodology and findings, logs of hunting activities, or dashboards from threat hunting platforms. These documents should demonstrate a systematic approach to searching for threats rather than just responding to alerts.

Implementation Example

Perform threat hunting to look for signs of threat actors within the environment

ID: ID.RA-03.157

Context

Function
ID: IDENTIFY
Category
ID.RA: Risk Assessment
Sub-Category
Internal and external threats to the organization are identified and recorded

ResponseHub is the product I wish I had when I was a CTO

Previously I was co-founder and CTO of Progression, a VC backed HR-tech startup used by some of the biggest names in tech.

As our sales grew, security questionnaires quickly became one of my biggest pain-points. They were confusing, hard to delegate and arrived like London busses - 3 at a time!

I'm building ResponseHub so that other teams don't have to go through this. Leave the security questionnaires to us so you can get back to closing deals, shipping product and building your team.

Signature
Neil Cameron
Founder, ResponseHub
Neil Cameron