Using threat hunting information to assist IR
While performing hunt operations, you'll likely identify events that will require an IR operation. Beyond the identification of potential intrusion events, threat hunters have an additional context that can assist in the response efforts.
As we discussed in Chapter 1, Introduction to Cyber Threat Intelligence, Analytical Models, and Frameworks, there are several models that we can use to inform response decisions by the IR team members.
Hunt and IR teams frequently work together during a response. It is important to remember to navigate this situation sensitively. While it may appear to the responders or traditional security teams that you've identified a defect in their defense in the network, you should always underscore that you are part of the team. You have helped to identify a potential intrusion against a large network that has many entry and exit points. The intrusion wasn't necessarily accomplished through a lack...