A Simple Hunting Maturity Model UPDATE 2015-10-15: I received some questions about the roles of automation in HMM0 and HMM4, which I addressed in a new section. Also, I named the levels to make them easier to reference. It's been conference season for me lately. I've attended several in the last few months, and most of them have had at least a few sessions on "hunting". Since that's a research interest of mine, of course I attended all of them that I could possibly fit into my schedule. I've gotten some great ideas from these presentations, and have begun to notice some patterns in what's being presented. I've also spoken with a number of people at the conferences who have made some variation of the remark, "Sure, we'd like to hunt, but how do we figure out where to start?" Recently, I had the opportunity to discuss with my colleagues the common types of activities that a security team does, and how they relate to hunting. I drew from the presentations I've seen and the conversations I've had to make some generalizations about the different levels of capability within hunting organizations I've encountered. These were literally just some bullet points on a whiteboard, but one of my colleagues said something along the lines of "That's kind of like a maturity model" and that got me to thinking. I realized that I had never actually seen anything like that, but I thought it was an interesting idea.
A cybersecurity incident management platform for tracking and reporting incidents with agility and speed.
Receive important notifications and updates related to North American electric grid security.
PowerGRR is a PowerShell module for the GRR API, allowing automation and scripting for incident response and remote live forensics.
A web collaborative platform for incident responders to share technical details during investigations, shipped in Docker containers for easy installation and upgrades.
A standardized framework for describing and classifying cybersecurity incidents
A panic button app for triggering a ripple effect across apps responding to panic events
Repository of playbooks, scripts, and templates for automating and orchestrating Security Operations.
CrowdStrike Charlotte AI is a conversational AI assistant that accelerates security operations by automating tasks and providing faster intelligence through generative AI capabilities.
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.
An AI-driven data classification and governance platform that automatically discovers, analyzes, and labels sensitive information while providing risk management and compliance capabilities.
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.