{"id":1615,"date":"2023-11-24T04:18:33","date_gmt":"2023-11-24T04:18:33","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/?p=1615"},"modified":"2024-06-10T23:30:38","modified_gmt":"2024-06-10T23:30:38","slug":"hunting-maturity-2","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/","title":{"rendered":"Hunting Maturity: Hunt as a Pack"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1615\" class=\"elementor elementor-1615\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-154ea57 e-flex e-con-boxed e-con e-parent\" data-id=\"154ea57\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6b470cb e-con-full e-flex e-con e-child\" data-id=\"6b470cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d6b77d5 e-con-full e-flex e-con e-child\" data-id=\"d6b77d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-277abb3 e-con-full e-flex e-con e-child\" data-id=\"277abb3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a36874a elementor-widget elementor-widget-text-editor\" data-id=\"a36874a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>One of the key benefits of participating in an Information Sharing and Analysis Organization (ISAO) is the benefit of resource sharing for cyber threat hunting talent.\u00a0\u00a0<\/p><p>After a photo safari in Africa I decided to develop a short video clip from some of the photos.\u00a0 These photos are intended to convey the story of those hunting for prey for survival.\u00a0 I&#8217;ll let you draw your own conclusions about the implications for cyber threat hunters.<\/p><p>Read on after the video to find out some of the other benefits of joining an ISAO.\u00a0\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-31fdb16 e-con-full e-flex e-con e-child\" data-id=\"31fdb16\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bfb9ee5 elementor-widget elementor-widget-spacer\" data-id=\"bfb9ee5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd7cf4e elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"fd7cf4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;highlighted_text&quot;:&quot;Rhythm&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;marker&quot;:&quot;circle&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3 class=\"elementor-headline\">\n\t\t\t\t\t<span class=\"elementor-headline-plain-text elementor-headline-text-wrapper\">Listen to the<\/span>\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">Rhythm<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52cbd76 e-flex e-con-boxed e-con e-parent\" data-id=\"52cbd76\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-09fba3b e-con-full e-flex e-con e-child\" data-id=\"09fba3b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f9c81d4 elementor-widget elementor-widget-video\" data-id=\"f9c81d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;start&quot;:0,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-hosted-video elementor-wrapper elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video lazyload\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/huntingmaturity-Original.mp4\" controls=\"\" preload=\"metadata\" controlsList=\"nodownload\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c51d530 e-flex e-con-boxed e-con e-parent\" data-id=\"c51d530\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0c649cd elementor-widget elementor-widget-spacer\" data-id=\"0c649cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e6e33a5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e6e33a5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ceec8f\" data-id=\"8ceec8f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-98c9fc9 elementor-widget elementor-widget-text-editor\" data-id=\"98c9fc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the rapidly evolving landscape of cybersecurity, the significance of collaborative defense mechanisms cannot be overstated. ISAOs and Information Sharing and Analysis Centers (ISACs) represent key platforms for such collaboration. These entities offer a structured environment for sharing timely and relevant cyber threat information among various stakeholders. The participation in ISAOs or ISACs can yield substantial benefits for organizations striving to bolster their cyber defenses.<\/p><p><strong>Enhanced Threat Intelligence<\/strong><\/p><p>One of the primary advantages of joining an ISAO or ISAC is the access to a broader spectrum of cyber threat intelligence. These platforms aggregate data from multiple sources, providing a more comprehensive understanding of the current threat landscape. This collective intelligence enables organizations to identify and respond to emerging threats more quickly and effectively than they could in isolation.<\/p><p><strong>Improved Cybersecurity Posture<\/strong><\/p><p>Membership in these organizations facilitates the exchange of best practices and security strategies. Learning from the experiences of others can help members refine their cybersecurity policies and procedures. This collaborative environment encourages a proactive approach to security, rather than a reactive one, ultimately strengthening an organization\u2019s overall cybersecurity posture.<\/p><p><strong>Cost-Effective Resource Utilization<\/strong><\/p><p>For many organizations, especially small and medium-sized enterprises, the resources needed to maintain an extensive in-house cybersecurity team are often prohibitive. Participation in an ISAO or ISAC offers a cost-effective alternative. It provides access to a wealth of expertise and resources that might otherwise be inaccessible, allowing organizations to optimize their cybersecurity spending.\u00a0 Cyber observable threat hunters (COTHs) are rare because of the unique blend of technical expertise and knowledge of intelligence tradecraft.\u00a0 ISAOs and ISACs can offer access by small and medium-sized enterprises to world-class talent for COTH research.\u00a0<\/p><p><strong>Legal and Regulatory Compliance<\/strong><\/p><p>ISAOs and ISACs often provide guidance and support regarding compliance with various cybersecurity laws and regulations. This is particularly valuable as the legal landscape around data protection and privacy continues to evolve. Members can benefit from shared experiences and strategies for navigating these complex regulatory environments.<\/p><p><strong>Community and Networking<\/strong><\/p><p>Joining an ISAO or ISAC also presents opportunities for networking and building relationships with peers in the cybersecurity field. These connections can be invaluable for collaborative problem-solving, career development, and staying abreast of industry trends and innovations.<\/p><p><strong>Conclusion<\/strong><\/p><p>The dynamic and interconnected nature of today\u2019s cyber threats necessitates a collaborative approach to cybersecurity. ISAOs and ISACs offer a platform for such collaboration, providing numerous benefits including enhanced threat intelligence, improved cybersecurity posture, cost-effective resource utilization, assistance with legal and regulatory compliance, and opportunities for community building and networking. For organizations committed to strengthening their cybersecurity defenses, participation in these entities is not just beneficial but essential in navigating the complex and ever-changing digital landscape.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d1420f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d1420f4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a96a018\" data-id=\"a96a018\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64612bf elementor-widget elementor-widget-text-editor\" data-id=\"64612bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Wild dog packs in Africa are known for their exceptional hunting skills and high success rates in capturing prey. Their success can be attributed to several key factors, and I&#8217;ll provide a factual explanation for each:<\/p>\n<p style=\"padding-left: 40px;\">1. Cooperative Hunting: Wild dogs are highly social animals that hunt in packs, which gives them a significant advantage. They collaborate effectively during hunts, working as a team to chase, corner, and bring down their prey. This coordinated effort increases their chances of success.<\/p>\n<p style=\"padding-left: 40px;\">2. Stamina: Wild dogs have remarkable endurance. They are known for their ability to pursue prey over long distances at a steady pace. Unlike many predators that rely on short bursts of speed, wild dogs can maintain a chase for several kilometers, eventually wearing down their prey.<\/p>\n<p style=\"padding-left: 40px;\">3. Communication: Wild dogs have a complex system of vocalizations, such as yips, whines, and chirps, that they use to communicate with each other during hunts. This communication helps them coordinate their movements, surround the prey, and execute successful ambushes.<\/p>\n<p style=\"padding-left: 40px;\">4. High Success Rate: Wild dogs are efficient hunters, with a success rate estimated to be around 60-80%. This high success rate is partly due to their teamwork, stamina, and effective communication. They are known for their ability to bring down prey that is much larger than themselves.<\/p>\n<p style=\"padding-left: 40px;\">5. Specialized Diet: Wild dogs primarily target small to medium-sized ungulates like impalas and gazelles. Their diet is adapted to their hunting capabilities, which means they focus on prey that they can easily chase down and overpower.<\/p>\n<p style=\"padding-left: 40px;\">6. Lack of Competition: Wild dogs are not in direct competition with other large carnivores like lions and hyenas for their prey. Unlike lions that often steal kills from other predators, wild dogs are more specialized hunters and rely on their own hunting skills.<\/p>\n<p style=\"padding-left: 40px;\">7. Minimal Impact on Ecosystem: Wild dogs have a relatively low impact on their ecosystem compared to other large predators. They do not kill more prey than they need and are considered one of the &#8220;keystone species&#8221; that help maintain the ecological balance in their habitat.<\/p>\n<p>In summary, the success of wild dog packs in hunting can be attributed to their cooperative hunting behavior, stamina, effective communication, specialized diet, and lack of direct competition with other large predators. These factors make them highly efficient and successful hunters in the African wilderness.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from the most effective hunters in Africa.<\/p>\n","protected":false},"author":2,"featured_media":1618,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"video","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[2,325],"tags":[67,289],"class_list":["post-1615","post","type-post","status-publish","format-video","has-post-thumbnail","hentry","category-coth","category-hunting","tag-cybersecurity","tag-threat-hunting","post_format-post-format-video"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from the most effective hunters in Africa.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Hunting Maturity: Hunt as a Pack - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from the most effective hunters in Africa.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2023-11-24T04:18:33+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-10T23:30:38+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Hunting Maturity: Hunt as a Pack - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from the most effective hunters in Africa.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/#blogposting\",\"name\":\"Hunting Maturity: Hunt as a Pack - CTIN\",\"headline\":\"Hunting Maturity: Hunt as a Pack\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/DogsHuntingImage1.png\",\"width\":1600,\"height\":820},\"datePublished\":\"2023-11-24T04:18:33+00:00\",\"dateModified\":\"2024-06-10T23:30:38+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/#webpage\"},\"articleSection\":\"COTH, Hunting, cybersecurity, threat hunting, Video\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/#listItem\",\"name\":\"COTH\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/#listItem\",\"position\":3,\"name\":\"COTH\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/hunting\\\/#listItem\",\"name\":\"Hunting\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/hunting\\\/#listItem\",\"position\":4,\"name\":\"Hunting\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/hunting\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/#listItem\",\"name\":\"Hunting Maturity: Hunt as a Pack\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/#listItem\",\"name\":\"COTH\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/#listItem\",\"position\":5,\"name\":\"Hunting Maturity: Hunt as a Pack\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/hunting\\\/#listItem\",\"name\":\"Hunting\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/\",\"name\":\"Hunting Maturity: Hunt as a Pack - CTIN\",\"description\":\"A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from the most effective hunters in Africa.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/DogsHuntingImage1.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/#mainImage\",\"width\":1600,\"height\":820},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2023\\\/11\\\/24\\\/hunting-maturity-2\\\/#mainImage\"},\"datePublished\":\"2023-11-24T04:18:33+00:00\",\"dateModified\":\"2024-06-10T23:30:38+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Hunting Maturity: Hunt as a Pack - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Hunting Maturity: Hunt as a Pack - CTIN","description":"A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from the most effective hunters in Africa.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/#blogposting","name":"Hunting Maturity: Hunt as a Pack - CTIN","headline":"Hunting Maturity: Hunt as a Pack","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/DogsHuntingImage1.png","width":1600,"height":820},"datePublished":"2023-11-24T04:18:33+00:00","dateModified":"2024-06-10T23:30:38+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/#webpage"},"articleSection":"COTH, Hunting, cybersecurity, threat hunting, Video"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/#listItem","name":"COTH"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/#listItem","position":3,"name":"COTH","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/hunting\/#listItem","name":"Hunting"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/hunting\/#listItem","position":4,"name":"Hunting","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/hunting\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/#listItem","name":"Hunting Maturity: Hunt as a Pack"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/#listItem","name":"COTH"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/#listItem","position":5,"name":"Hunting Maturity: Hunt as a Pack","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/hunting\/#listItem","name":"Hunting"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/","name":"Hunting Maturity: Hunt as a Pack - CTIN","description":"A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from the most effective hunters in Africa.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2023\/11\/DogsHuntingImage1.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/#mainImage","width":1600,"height":820},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/#mainImage"},"datePublished":"2023-11-24T04:18:33+00:00","dateModified":"2024-06-10T23:30:38+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Hunting Maturity: Hunt as a Pack - CTIN","og:description":"A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from the most effective hunters in Africa.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2023-11-24T04:18:33+00:00","article:modified_time":"2024-06-10T23:30:38+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Hunting Maturity: Hunt as a Pack - CTIN","twitter:description":"A photo safari in Africa made me reflect on the state-of-the-art in cyber threat hunting. There are lessons we can draw from the most effective hunters in Africa.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"1615","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:01:01","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2024-04-18 16:57:44","updated":"2025-08-25 22:01:01"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/\" title=\"COTH\">COTH<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/hunting\/\" title=\"Hunting\">Hunting<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tHunting Maturity: Hunt as a Pack\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"COTH","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/"},{"label":"Hunting","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/hunting\/"},{"label":"Hunting Maturity: Hunt as a Pack","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2023\/11\/24\/hunting-maturity-2\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=1615"}],"version-history":[{"count":84,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1615\/revisions"}],"predecessor-version":[{"id":3225,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/1615\/revisions\/3225"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/1618"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=1615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=1615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=1615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}