Client computing is increasingly providing a back door into the enterprise for the compromise and
If your organization doesn't run its own threat analysis center, it may be worth hiring a hunt team to watch your back. Here's what you need to know.
In response to sophisticated cybersecurity threats which have emerged in the past few years, some organizations in industry and government have formed groups known as "hunt teams" to defend their networks.
The term comes from the U.S. Department of Defense, according to eSentire, a cybersecurity firm specializing in helping enterprises deal with advanced threats. It refers to "a group of operational network defenders skilled in the latest attack techniques, and how to defend against them," the company explained in a white paper on the subject.
To some extent the term is jargon. Though it has undeniable cinematic flair – "hunt team" sounds far more dynamic than "IT experts reviewing incident logs" – it doesn't represent a radical departure from cybersecurity practices a decade ago, even if online attacks have become more complicated.
At the same time, it's more than a buzzword because there really are cyber security researchers out there who fit the definition.
At the RSA Conference in 2015, Joshua Stevens, enterprise security architect for HP Security, gave a presentation on hunt team skillsets and on the ways analytics and visualization tools can be used to help identify cyber threats. The qualifications cited in the presentation suggest hunt team members should have advanced intrusion detection and malware analysis skills, data science and programming skills, and a creative, analytical mindset.
A hunt team, then, is a group of cyber security experts. Gartner employs the term Managed Detection and Response to describe the business model rather than the group of people.
[Where is cybersecurity headed? Read 7 Cyber-Security Skills In High Demand.]
The CTO of a mid-sized financial firm based in New York spoke with InformationWeek in a phone interview about how his company employs a hunt team. He asked that he and his firm, a customer of eSentire's, not be named.
His company, he said, has outsourced its hunt team to eSentire, while also working with another unspecified security vendor.
"The idea is we're not qualified to do that," he said. "They employ a network operations center with analysts working around the clock."
Finding qualified people can be a challenge, given the shortage of skilled cybersecurity professionals. "My peers generally agree it would be very difficult to have this kind of expertise in house," the CTO said. "Even if you could bring the skills in house it's probably not a good idea because it's such a dynamic field."
If you try to assemble an in-house hunt team, your own personnel may have to work harder to benefit from external incidents. A vendor handling many clients, however, can apply what it learned from one client to protect its other customers.
While 99% of the time nothing goes wrong at this CTO's particular financial company – and that's with thousands of touches on its network daily – the round-the-clock vigilance of a hunt team has still proven valuable. The CTO said his company uses eSentire to its potential every minute of every day. He recounted the time when an ad injection attack got past the company scanners and infected a computer. The compromised machine tried to reach out for additional malware but eSentire caught it.
"It was the fact eSentire was analyzing our data in real-time that prevented anything bad from happening," the CTO said. "Plenty of companies purport to be intrusion detection, but few have real-time human intervention."