Logo

CISOBot - Your AI CISO Assistant

THR-07

Threat Hunting

Weight: 4/10
Description

Mechanisms exist to perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls.

Control Question

Does the organization perform cyber threat hunting that uses Indicators of Compromise (IoC) to detect, track and disrupt threats that evade existing security controls?

Control Metadata
Domain:

Threat Management

Validation Cadence:

Annual

Evidence Request List:

E-THR-05

Have questions about this control?

Ask CISOBot for implementation guidance and best practices