Page 50 - Dataquest
P. 50
INTEllIGENT COMPUTING | SECURITY
Tanmoy saha
maildqindia@cybermedia.co.in
Cyber Analytics Driven Threat
Hunting: The Next Step for data
Security Management
Threat Hunting is an analyst-centric process which requires a significant
investment of personnel, equipment, and time
he barrage of technology in the 21st century is marily on preventive technologies, and rule & signature-
pushing organizations to keep up with the pace based detection mechanisms ineffective. This evidently
of innovations for delivering expanded and more emphasizes the need for organizations to adopt smarter
T efficient services to their customers. The disrup- ways to tackle the ever changing threat scenario.
tive technologies like Cloud Computing, IT Mobility, Inter- As organizations do not have the key information to
net of Things, Industry 4.0 etc. are reshaping the world contextualize and lack the trained resources for per-
faster than ever before and have paved the way for digital forming the risk analysis, the primary challenge it faces
transformation. But embracing these technologies neces- in threat detection and risk mitigation, is gaining visibil-
sitates the enterprise to connect with external stakehold- ity into their environment. In the wake of this stumbling
ers including customers, service providers, vendors, and block and the ever-intensifying threat scenario, CISOs
regulators. And such integrations can expose organiza- now want to know the answers to pertinent questions
tions to a host of malicious attacks & breaches. In addition like the real-time risk posture of the company? Any Mis-
to this, the emergence of lethal threats like ransomware behaving users or Machine on the network? Indicators
has rendered Security Operations Centers which rely pri- in case the networks are compromised after making a
50 | January, 2018 www.dqindia.com A CyberMedia Publication |