Summary
In this chapter, we discussed an IR process and looked at the different phases and examples of how they are leveraged during an incident. We explored how to use the MITRE ATT&CK framework and Lockheed Martin's Cyber Kill Chain model to analyze a supply chain compromise example and inform security priorities. Finally, we discussed several sources for expanding and growing your skills as a threat hunter.
Using the skills we covered in this chapter will make you valuable beyond your ability to find adversaries. While that is crucial in your job as a threat hunter, being able to support the enduring security teams and prioritizations helps the overall posture of the organization.
In the next chapter, we'll discuss enriching events with open source tools, enriching events with third-party tools, and using enrichments to explore additional information.