Page 168 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 168

through an automated response are processed, while security events requiring a hands-on
                   response are handled by the MDR’s cybersecurity analysts and threat hunters.

               •  Monitor the Threat Landscape. Organizations must have access to relevant threat
                   intelligence, and it must be actioned in a timely fashion. Internal security teams need to be
                   specifically informed about their operating environment, working in concert with their external
                   security provider.


            Learn more about eSentire’s industry renowned Threat Response Unit.

            Read eSentire’s latest Security Advisories and Reports.








            About the Author

            Keegan  Keplinger  is  the  Research  and  Reporting
            Lead  for  the  Threat  Response  Unit  at  eSentire.  He
            conducts threat research and disseminates reports on
            threat  activity  with  the  goal  of  understanding  threat
            actor  behavior  and  economics.    Keegan  has  an
            undergraduate  degree  in  physics  and  graduate
            degrees in neuroscience and applied mathematics; he
            originally  joined  eSentire  as  the  Data  Visualization
            Lead  on  the  Threat  Intelligence  team  in  2017,  but
            quickly  evolved  into  a  broader  role  in  detection
            engineering, conducting threat hunts, and reporting on previously unobserved threat activity.

            Keegan  can  be  reached  online  at  [email protected]  and  at  our  company  website
            https://www.esentire.com/.
























                                                                                                            168
   163   164   165   166   167   168   169   170   171   172   173