top of page
THREAT HUNTING
What is
Cyber threat hunting is a proactive security
search through networks, endpoints, and
datasets to hunt malicious, suspicious, or
risky activities that have evaded detection
by existing tools.
PILLAR can
OPTIMIZE
Threat Hunting
your
COMPLIMENTARY 2-HOUR
LIVE THREAT HUNTING EXERCISE
IN YOUR ENVIRONMENT
Wherever you are on the threat hunting
maturity curve, whether you're trying to
perfect your threat hunting discipline or just
trying to get started, Pillar will provide expert
Threat Hunting guidance and address all of
your questions
Call 678-431-0808
or click below to schedule you
Threat Hunting Exercise.
PILLAR'S
DIFFERENT
APPROACH
Pillar follows a threat hunting process based
on both the Lockheed Martin Kill Chain and
MITRE Att&ck Frameworks. Combined with our
deep knowledge of infosec intel and
experience with Intelligence Tools and Hands-
on Tools, Pillar provides a very proactive and
effective approach to security defense.
TIPS for
PROTECTION
Understand Environment
• Threat surfaces
• Critical assets
• Logs
• Behaviors
Know
Attackers
• Likely threat actors
• Likely TTPs of those actors
• IoC's of the attacks
• OSInt Sources
Assess
Enviroment
• Logs
• Hunt for IoC's
• Verify hashes
• Access/ usage patterns
• Account/ system changes
• Help desk tickets
• System alerts
• Abnormal activities
Tune Monitoring Capabilities
• Assess logging levels
• Centralize log aggregation
• Implement Monitoring tools (SIEM, Log Analysis Tool, UEBA platform)
•Subscribe to OSInt resources
EXERCISE
THREAT HUNTING
Threat hunting is becoming more and more important to maintaining a strong security posture.
Pillar Technology Partners is pleased to offer complimentary threat hunting assistance
in your environment
Sign up on the calendar below to get started.
Schedule a session
bottom of page