Presented at the Rocky Mountain Information Security Conference 2017.
Massive volumes of logs are generated and collected in every company around the world on a constant basis. How often are you looking at them for threats? Monitoring of the SIEM has become the go-to security response method for too many companies. A resurgence of proactive searching for threats is upon us and people are calling it "threat hunting". Looking at your data is not new, but a reminder of how fruitful it can be may help prioritize it in your daily work.