Page 168 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 168
through an automated response are processed, while security events requiring a hands-on
response are handled by the MDR’s cybersecurity analysts and threat hunters.
• Monitor the Threat Landscape. Organizations must have access to relevant threat
intelligence, and it must be actioned in a timely fashion. Internal security teams need to be
specifically informed about their operating environment, working in concert with their external
security provider.
Learn more about eSentire’s industry renowned Threat Response Unit.
Read eSentire’s latest Security Advisories and Reports.
About the Author
Keegan Keplinger is the Research and Reporting
Lead for the Threat Response Unit at eSentire. He
conducts threat research and disseminates reports on
threat activity with the goal of understanding threat
actor behavior and economics. Keegan has an
undergraduate degree in physics and graduate
degrees in neuroscience and applied mathematics; he
originally joined eSentire as the Data Visualization
Lead on the Threat Intelligence team in 2017, but
quickly evolved into a broader role in detection
engineering, conducting threat hunts, and reporting on previously unobserved threat activity.
Keegan can be reached online at [email protected] and at our company website
https://www.esentire.com/.
168