What IT Pros Need To Know About Hiring Cyber Security Hunt Teams

...

Client computing is increasingly providing a back door into the enterprise for the compromise and

If your organization doesn't run its own threat analysis center, it may be worth hiring a hunt team to watch your back. Here's what you need to know.

In response to sophisticated cybersecurity threats which have emerged in the past few years, some organizations in industry and government have formed groups known as "hunt teams" to defend their networks.

The term comes from the U.S. Department of Defense, according to eSentire, a cybersecurity firm specializing in helping enterprises deal with advanced threats. It refers to "a group of operational network defenders skilled in the latest attack techniques, and how to defend against them," the company explained in a white paper on the subject.

To some extent the term is jargon. Though it has undeniable cinematic flair – "hunt team" sounds far more dynamic than "IT experts reviewing incident logs" – it doesn't represent a radical departure from cybersecurity practices a decade ago, even if online attacks have become more complicated.

At the same time, it's more than a buzzword because there really are cyber security researchers out there who fit the definition.

At the RSA Conference in 2015, Joshua Stevens, enterprise security architect for HP Security, gave a presentation on hunt team skillsets and on the ways analytics and visualization tools can be used to help identify cyber threats. The qualifications cited in the presentation suggest hunt team members should have advanced intrusion detection and malware analysis skills, data science and programming skills, and a creative, analytical mindset.

A hunt team, then, is a group of cyber security experts. Gartner employs the term Managed Detection and Response to describe the business model rather than the group of people.

[Where is cybersecurity headed? Read 7 Cyber-Security Skills In High Demand.]

The CTO of a mid-sized financial firm based in New York spoke with InformationWeek in a phone interview about how his company employs a hunt team. He asked that he and his firm, a customer of eSentire's, not be named.

His company, he said, has outsourced its hunt team to eSentire, while also working with another unspecified security vendor.

"The idea is we're not qualified to do that," he said. "They employ a network operations center with analysts working around the clock."

Finding qualified people can be a challenge, given the shortage of skilled cybersecurity professionals. "My peers generally agree it would be very difficult to have this kind of expertise in house," the CTO said. "Even if you could bring the skills in house it's probably not a good idea because it's such a dynamic field."

If you try to assemble an in-house hunt team, your own personnel may have to work harder to benefit from external incidents. A vendor handling many clients, however, can apply what it learned from one client to protect its other customers.

While 99% of the time nothing goes wrong at this CTO's particular financial company – and that's with thousands of touches on its network daily – the round-the-clock vigilance of a hunt team has still proven valuable. The CTO said his company uses eSentire to its potential every minute of every day. He recounted the time when an ad injection attack got past the company scanners and infected a computer. The compromised machine tried to reach out for additional malware but eSentire caught it.

"It was the fact eSentire was analyzing our data in real-time that prevented anything bad from happening," the CTO said. "Plenty of companies purport to be intrusion detection, but few have real-time human intervention."

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    Google Play Music Serves Up Tunes With Machine Learning

    Using machine learning, Play Music will now create a unique experience based on individual listeners' taste, location, and activity—even the current weather.Users will also notice a new look: The revamped Google Play Music home screen features features favorite playlists, latest releases, and more tunes from popular artists—at the right time and place for you.
  • 5300c769af79e

    Telegram Messenger (for iPhone)

    Any Telegram user who has your phone number in their Contacts list will see you in their Telegram contacts.It is possible that a hacker could steal, or law enforcement subpoena, messages and keys from Telegram's servers.
  • 5300c769af79e

    Top 6 Application Security Hurdles and the Secret to Overcoming Them

    These applications also contain 92% of reported security vulnerabilities, not networks.Yet application security continues to receive less budget and attention than network security.
  • 5300c769af79e

    Microsoft Teases Smartphone Hover Gestures

    If Microsoft has its way, you'll soon be able to interact with your Windows Phone device in all sorts of new and interesting ways, and you won't have to tap your smartphone nearly as much to do it.In the research team's video, you can clearly see the phone registering the strength (and direction) of a person's grip as he or she holds the device.