Threat Hunting: What Should Keep All of Us Up at Night
• Webcast
Publisher
Software Engineering Institute
Topic or Tag
Watch
Abstract
When it comes to recognizing threats, cybersecurity professionals may become distracted by big promises or ignore some obvious inspections. New claims made by the latest and greatest new apps draw attention away from network situational awareness best practices—like a dog distracted when it spots a squirrel. We also may deviate from making routine inspections that point toward further investigation—overlooking obvious needs right under our noses. Either becoming distracted or missing obvious inspections can cause us not to detect threats.
What Attendees Will Learn:
- The distinction between anomalies and threats
- Steps to analyze data to detect a threat
- The benefits of completing work on one threat
About the Speaker

Matthew J. Butkovic
Matthew Butkovic is the Technical Director of the Cyber Risk and Resilience Assurance Directorate in the CERT Division of the Carnegie Mellon University Software Engineering Institute (CMU SEI).
Matt performs critical infrastructure protection research and develops methods, tools, and techniques for evaluating capabilities and managing risk. This includes addressing the …
Read more