What IT Pros Need To Know About Hiring Cyber-Security Hunt Teams
If your organization doesn't run its own threat analysis center, it may be worth hiring a hunt team to watch your back. Here's what you need to know.
10 IoT Security Best Practices For IT Pros
(Click image for larger view and slideshow.)
In response to sophisticated cyber-security threats that have emerged in the past few years, some organizations in industry and government have formed groups known as "hunt teams" to defend their networks.
The term comes from the US Department of Defense, according to eSentire, a cyber-security firm specializing in helping enterprises deal with advanced threats. It refers to "a group of operational network defenders skilled in the latest attack techniques, and how to defend against them," the company explained in a whitepaper on the subject.
To some extent the term is jargon. Though it has undeniable cinematic flair -- "hunt team" sounds far more dynamic than "IT experts reviewing incident logs" -- it doesn't represent a radical departure from cyber-security practices a decade ago, even if online attacks have become more complicated.
At the same time, it's more than a buzzword because there really are cyber-security researchers out there who fit the definition.
At the RSA Conference in 2015, Joshua Stevens, enterprise security architect for HP Security, gave a presentation on hunt team skill sets and on the ways analytics and visualization tools can be used to help identify cyber threats.
The qualifications cited in the presentation suggest hunt team members should have advanced intrusion detection and malware analysis skills, data science and programming skills, and a creative, analytical mindset.
A hunt team, then, is a group of cyber-security experts. Gartner employs the term managed detection and response to describe the business model rather than the group of people.
The CTO of a midsize financial firm based in New York spoke with InformationWeek in a phone interview about how his company employs a hunt team. He asked that he and his firm, a customer of eSentire's, not be named.
His company, he said, has outsourced its hunt team to eSentire, while also working with another unspecified security vendor.
"The idea is we're not qualified to do that," he said. "They employ a network operations center with analysts working around the clock."
Finding qualified people can be a challenge, given the shortage of skilled cyber-security professionals. "My peers generally agree it would be very difficult to have this kind of expertise in house," the CTO said. "Even if you could bring the skills in-house, it's probably not a good idea, because it's such a dynamic field."
If you try to assemble an in-house hunt team, your own personnel may have to work harder to benefit from external incidents. A vendor handling many clients, however, can apply what it learned from one client to protect its other customers.
While 99% of the time nothing goes wrong at this CTO's particular financial company -- and that's with thousands of touches on its network daily -- the round-the-clock vigilance of a hunt team has still proven valuable. The CTO said his company uses eSentire to its potential every minute of every day.
He recounted the time when an ad injection attack got past the company scanners and infected a computer. The compromised machine tried to reach out for additional malware, but eSentire caught it.
"It was the fact eSentire was analyzing our data in real-time that prevented anything bad from happening," the CTO said. "Plenty of companies purport to be intrusion detection, but few have real-time human intervention."
Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful ... View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Cybersecurity Strategies for the Digital EraAt its core, digital business relies on strong security practices. In addition, leveraging security intelligence and integrating security with operations and developer teams can help organizations push the boundaries of innovation.