What IT Pros Need To Know About Hiring Cyber Security Hunt Teams

...

Client computing is increasingly providing a back door into the enterprise for the compromise and

If your organization doesn't run its own threat analysis center, it may be worth hiring a hunt team to watch your back. Here's what you need to know.

In response to sophisticated cybersecurity threats which have emerged in the past few years, some organizations in industry and government have formed groups known as "hunt teams" to defend their networks.

The term comes from the U.S. Department of Defense, according to eSentire, a cybersecurity firm specializing in helping enterprises deal with advanced threats. It refers to "a group of operational network defenders skilled in the latest attack techniques, and how to defend against them," the company explained in a white paper on the subject.

To some extent the term is jargon. Though it has undeniable cinematic flair – "hunt team" sounds far more dynamic than "IT experts reviewing incident logs" – it doesn't represent a radical departure from cybersecurity practices a decade ago, even if online attacks have become more complicated.

At the same time, it's more than a buzzword because there really are cyber security researchers out there who fit the definition.

At the RSA Conference in 2015, Joshua Stevens, enterprise security architect for HP Security, gave a presentation on hunt team skillsets and on the ways analytics and visualization tools can be used to help identify cyber threats. The qualifications cited in the presentation suggest hunt team members should have advanced intrusion detection and malware analysis skills, data science and programming skills, and a creative, analytical mindset.

A hunt team, then, is a group of cyber security experts. Gartner employs the term Managed Detection and Response to describe the business model rather than the group of people.

[Where is cybersecurity headed? Read 7 Cyber-Security Skills In High Demand.]

The CTO of a mid-sized financial firm based in New York spoke with InformationWeek in a phone interview about how his company employs a hunt team. He asked that he and his firm, a customer of eSentire's, not be named.

His company, he said, has outsourced its hunt team to eSentire, while also working with another unspecified security vendor.

"The idea is we're not qualified to do that," he said. "They employ a network operations center with analysts working around the clock."

Finding qualified people can be a challenge, given the shortage of skilled cybersecurity professionals. "My peers generally agree it would be very difficult to have this kind of expertise in house," the CTO said. "Even if you could bring the skills in house it's probably not a good idea because it's such a dynamic field."

If you try to assemble an in-house hunt team, your own personnel may have to work harder to benefit from external incidents. A vendor handling many clients, however, can apply what it learned from one client to protect its other customers.

While 99% of the time nothing goes wrong at this CTO's particular financial company – and that's with thousands of touches on its network daily – the round-the-clock vigilance of a hunt team has still proven valuable. The CTO said his company uses eSentire to its potential every minute of every day. He recounted the time when an ad injection attack got past the company scanners and infected a computer. The compromised machine tried to reach out for additional malware but eSentire caught it.

"It was the fact eSentire was analyzing our data in real-time that prevented anything bad from happening," the CTO said. "Plenty of companies purport to be intrusion detection, but few have real-time human intervention."

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    Here is the New Boot Animation for Moto Phones

    ” We aren’t sure if that means future phones, as in, phones coming months from now or if the current crop of newish phones (like the Moto Z family) will see an update to this.In the past, while still under Google leadership, Motorola frequently update the boot animations on phones like the original Moto X.
  • 5300c769af79e

    Awesome tech you can’t buy yet: Astrocams, boombox art, and more

    A Touch of Bass — Boombox art, with built in speakers Remember Case of Bass?After more than a year of making badass suitcase boomboxes, they’re finally back with a new product: A Touch of Bass.
  • 5300c769af79e

    Oracle's DB Dilemma

    Everybody likes to use the mainframe as an example of how markets shrivel, and the Seeking Alpha article does too.) At any rate, Seeking Alpha's point is that the relational DB is old, it doesn't do some things that NoSQL does, and relational therefore is in trouble.
  • 5300c769af79e

    Microsoft and Intel's PC Revolution Is Called 'Project Evo'

    The first area Project Evo aims to improve is communication through Cortana.Rather than catering to a person sitting at a PC, Microsoft and Intel will expand that to allow Cortana to function across an entire room (think Amazon Echo, but Microsoft's take using a PC).