Threat Hunting Maturity Model PDF
Document Details
Uploaded by barrejamesteacher
null
Tags
Summary
This document discusses the threat hunting maturity model (HMM). It describes the different stages of maturity, from Initial to Leading, in the context of cybersecurity threat hunting processes. The document uses keywords like threat hunting, cybersecurity, and network security.
Full Transcript
Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools Threat Hunting Maturity IModel (HMIM)...
Certified Cybersecurity Technician Exam 212-82 Network Security Assessment Techniques and Tools Threat Hunting Maturity IModel (HMIM) (HIMIM) O The threat hunting maturity model (HMM) describes the quantity and quality of information collected from a network for investigation Q ' %y - 3 =3 » < 4 B g " [[AYA) VY Level 0: Level 1: Level 2: Level Level 33: - Level 4: ovative = Primarily *= Follows the = Adopts data = Creates (Creates | = Automates Automates depends on latest threat analysis custom data existing data automated reports reports procedures analysis analysis monitoring created by procedures procedures systems and = Moderate- Moderate- to others alerts igh- level hugh. hngh- *= High- to very- High- igh- to very