KPMG Threat Hunting | KPMG | NZ
close
Share with your friends

KPMG Threat Hunting

KPMG Threat Hunting

Providing actionable insights.

Cyber attacks have become increasingly complex and dynamic, and network defences are having trouble keeping up. Traditional security tools such as firewalls and anti-virus software have relied upon signatures and pre-defined rules to detect and escalate cyber security incidents. Security frameworks also tout perimeter defences and defence-in-depth as the tried and tested approach to designing a secure IT environment. However, advancements in attacker techniques and covert malware exploitation technologies, along with the evaporation of corporate boundaries, have greatly reduced the effectiveness of these security axioms.

With the threat looming and ever evolving, KPMG’s Threat Hunting service helps you answer the critical question being asked by boards and senior management “has our organisation been breached?”, and can support your organisation gain an understanding of your current exposure and help identify previously invisible threats.

By combining the investigative experience of KPMG’s cyber threat intelligence professionals with the multi-dimensional discovery capability of data science, we can help reveal threats and anomalies undetected by your current technologies.

The results can be the first step to an integrated approach to security operations, in a controlled and effective manner.

 

Read more about our Threat Hunting services here

 

Identification of threats

KPMG’s Threat Hunting service goes beyond “point in time” monitoring, and emphasises both expert analysis, and real time threat detection and hunting. The data collection process provides historical forensic evidence, which enables hunting of threats both current and historical to provide you:

  • Identification and analysis of previously unseen threats, including full kill chain (infection vector) analysis where possible.
  • Identification of anomalies, such as suspicious patterns of process execution.
  • Track and trace evidence of lateral movement and suspicious user behaviour.
  • Visibility of privilege escalation and credential dumping.

Connect with us

 

Request for proposal

 

Submit

Contact