Hunting out the threat within

Publish date:

Threat Hunting uniquely brings together automated threat data processing with in-depth human analysis to identify advanced persistent attacks and reduce the risk of a missed intrusion.

We’ve been helping a client in the aerospace and defense sector track down threats to its cybersecurity defenses. The government-owned organization has been protecting its assets with a dedicated Security Operations Center (SOC) provided by Capgemini.

Even though it was confident in the services our SOC was providing, the organization expressed an interest in our Threat Hunting services. These are designed to spot attackers that have successfully entered an IT system when protection and monitoring measures have failed to detect them.

Having been hacked in the past, our client wanted to be doubly assured that its activities in the highly sensitive sector within which it operated were protected. Our SOC could detect new attacks, but what about those that were lying dormant? The client was aware that persistent attackers, such as foreign governments, might have been successful in entering the system without being detected. As such, it commissioned our Threat Hunting services.

Investigating suspicious behavior

In a two-week project, a dedicated analysis was done on a defined critical perimeter, where Capgemini’s analysts investigated suspicious behaviors. Designed to prevent the likelihood of a missed intrusion into their IT system, these investigations focused on unknown persistent programs and modifications on known legitimate program..

Our Threat Hunting services epitomize “The Capgemini Effect” of adopting a human-centered approach to technology. Threat Hunting uniquely brings together automated threat data processing with in-depth human analysis to identify advanced persistent attacks and reduce the risk of a missed intrusion.

Crucially, with our SOC monitoring our client’s security round the clock, the results of our Threat Hunting investigation confirmed the integrity of the defined perimeter.

Related Posts

Cybersecurity

Capgemini presents Next Generation Security Operation Center

Christer Jansson
June 14, 2018
Next generation security operation centers (SOCs) resolve the need for cybersecurity skills and help organizations counter threats
Cybersecurity

Selling security and privacy: Why cybersecurity is the new competitive advantage for retailers

Subrahmanyam KVJ
May 28, 2018
Consumers now see cybersecurity and data privacy as one of the three main reasons to select a retailer, beating even price. In India, it even comes out on top as the number-one reason to do business with a particular retailer.
Cybersecurity

Are you prepared for the GDPR?

Peter Hansen
May 17, 2018
The general issue lies with anyone with justified and managed access to process data, for its purpose, since that’s the business need and actual reason for the data existing in the first place.
cookies.

By continuing to navigate on this website, you accept the use of cookies.

For more information and to change the setting of cookies on your computer, please read our Privacy Policy.

Close

Close cookie information