Cybersecurity Threat Hunting Explained
Вставка
- Опубліковано 8 січ 2023
- Learn more about current threats → ibm.biz/BdP3CZ
Learn about threat hunting → ibm.biz/BdPmfx
QRadar SIEM → ibm.biz/BdPmfR
It takes about 200 days to identify when your cybersecurity has been breached, and another 70 days to contain it according to the Ponemon Institute. Threat hunting is one way to try to minimize that time and prevent breaches before they happen. In this video Jeff shows how threat hunting works, what data security analysts use, and what tools they aggregate that data and accelerate the time to containment.
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
Love the lack of an intro. Gets right to the point and that’s what I like.
Ya to the point
Thanks for that feedback! I try really hard to do resist the urge to ramble but sometimes fail
This guy knows how to explain.
You are very kind!
Loved this! Provided a lot of value and some much-needed understanding of this part of the industry.
I’m so glad to hear it!
Thanks this has helped a lot in inderstanding the cysec industry!
clear and concise. thank you so much.
Awesome explanation.
Excellent security video
Thanks for the info! 🤙
Thanks for the video
excellent work sir
You guys really explain thoroughly and so well. Thank you.
Thanks for saying so!
clear & concise, thank you
BOOM!!!
Excellent
Thanks!!
Thank you so much
Wow superb
Great Video :)
thx teacher
So in a way, threat hunters are cyber detectives? Do they work in conjunction with threat intelligence analysts and other incident responders?
COOL DEMO!
Great content Sir.
You have mentioned AI to combine {SIEM,XDR,UBA}, does this is a responsibility of threat hunter or there is a tool that help with that?
In fact, there are later videos that talk about this that I’ve done for this channel. Search for SOAR, SOC and the cybersecurity architecture series (specifically Response) and you’ll see more
Great video
Thanks!
man you are amazing
You are very kind to say so!
Is there a certification for threat hunting? Does the AI is done by the threat hunter?
I haven’t seen one that focuses only on threat hunting as it is a bit of art and science but there may be one that I don’t know about. Yes, you can expect to see AI play a bigger role in this space in the future
👍👍👍
what kind of interactive screen does this presenter is using in this video ?
See ibm.biz/write-backwards
*B O O M*
Boom boom happened 😞
Hey! Myself Smriti from India. I needed some help with a paper presentation for my college's international conference. I was planning on doing my presentation on the topic:Navigating the Phishing Maze: Exploring Attacks and Fortifying Cybersecurity. I needed some guidance! Would love if you could help out
Excellent