Cybersecurity News Hub
No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us
No Result
View All Result
Cybersecurity News Hub
No Result
View All Result
Home Cyber Crime

Threat Hunting & AI In SOC

Cyberinchief by Cyberinchief
October 2, 2025
Reading Time: 5 mins read
0
Threat Hunting & AI In SOC


01 Oct Threat Hunting & AI In SOC | Ben McGavin, Justin Dolgos, Todd Willoughby (RSM) With Vladislav Babiuk

Posted at 11:14h
in Blogs
by Taylor Fox

Why you need to hear this episode of SOC Stars

RELATED POSTS

Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London

AI Expert: We Have 2 Years Before Everything Changes! We Need To Start Protesting! — Tristan Harris – Lifeboat News: The Blog

Russian police bust bank-account hacking gang that used NFCGate-based malware

– Vladislav Babiuk, Director of Technical Product Marketing

San Jose, Calif. – Oct. 1, 2025

If you care about the future of cybersecurity, this episode of SOC Stars with RSM’s “Threat Hunting Dream Team” is a must-listen. In just 30 minutes, Vlad Babiuk of Stellar Cyber moderates a conversation that cuts through hype and gets real about how AI, automation, and human expertise are reshaping security operations centers (SOCs).

Why This Matters Right Now

The security landscape is shifting fast. NextGen SIEM, XDR, and AI-driven SOC tools are accelerating detection, yet cyber attackers keep evolving. The central question: where do human threat hunters fit in a world of autonomous SOCs?

This discussion answers that question head-on. You’ll learn why manual threat hunting isn’t obsolete—it’s more critical than ever—and how SOCs can combine AI scale with human judgment to stay ahead of adversaries.

Buy JNews
ADVERTISEMENT

Key Takeaways You’ll Hear

  • Human intuition vs. machine speed: Todd Wilby, Director at RSM, makes the case that AI is powerful, but only humans can interpret context, spot edge cases, and fine-tune detection rules. 
  • AI as a teammate, not a replacement: Ben, RSM’s threat hunting lead, explains why today’s AI tends to over-flag and under-contextualize. Without humans, SOCs risk drowning in false positives. 
  • The “haystack vs. the needle” problem: Justin describes how AI narrows the haystack of alerts, but only human oversight can determine malicious intent and business impact. 
  • Proactive defense in action: Learn how RSM blends Stellar Cyber’s automation with human hunting to move beyond reactive alerts—catching anomalies across login patterns, infrastructure traffic, and more. 
  • Agentic AI as a force multiplier: Concrete examples show how AI can act like a junior analyst, automatically pulling forensic data, building timelines, and enriching context—leaving humans to chase the deeper trails. 
  • Fighting burnout: SOC analysts face high turnover due to alert fatigue and repetitive tasks. AI reduces workload and highlights true anomalies, extending careers and improving morale. 
  • The future of threat hunters: Instead of being replaced, hunters will evolve into strategic investigators—leading hunts, modeling adversary intent, and steering AI systems toward what matters most.

Why Listen All the Way Through

This isn’t another abstract “AI in security” debate. The conversation is grounded in real frontline experience. Todd, Ben, and Justin share candid insights from operating SOCs that process hundreds of thousands of alerts each quarter. They explain exactly how automation is deployed, what works, and where human creativity remains irreplaceable.

By the end, you’ll understand:

  • How to balance automation with human oversight. 
  • Why proactive hunting is the SOC differentiator of the future. 
  • How AI is changing analyst workflows—and making the job sustainable. 
  • What the role of the threat hunter will look like five years from now.


The Bottom Line

If you lead or work in a SOC—or simply want to understand where security operations are headed—this episode will sharpen your thinking. You’ll walk away with actionable insights on blending AI and human expertise, reducing alert fatigue, and building a SOC that’s not just reactive but resilient, proactive, and ready for tomorrow’s threats.

Invest 30 minutes. Gain a playbook for the next decade of cyber defense.

– Vladislav Babiuk, Director of Technical Product Marketing


About Stellar Cyber

Stellar Cyber’s Open XDR Platform delivers comprehensive, unified security without complexity, empowering lean security teams of any skill level to secure their environments successfully. With Stellar Cyber, organizations reduce risk with early and precise identification and remediation of threats while slashing costs, retaining investments in existing tools, and improving analyst productivity, delivering an 8X improvement in MTTD and a 20X improvement in MTTR. The company is based in Silicon Valley. For more information, visit https://stellarcyber.ai.



Source link

Tags: HuntingSOCThreat
ShareTweetPin
Cyberinchief

Cyberinchief

Related Posts

Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
Cyber Crime

Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London

December 27, 2025
AI Expert: We Have 2 Years Before Everything Changes! We Need To Start Protesting! — Tristan Harris – Lifeboat News: The Blog
Cyber Crime

AI Expert: We Have 2 Years Before Everything Changes! We Need To Start Protesting! — Tristan Harris – Lifeboat News: The Blog

December 9, 2025
Russian police bust bank-account hacking gang that used NFCGate-based malware
Cyber Crime

Russian police bust bank-account hacking gang that used NFCGate-based malware

December 8, 2025
How To Reframe Cybersecurity Budget Requests And Get Them Approved
Cyber Crime

How To Reframe Cybersecurity Budget Requests And Get Them Approved

December 8, 2025
Contractors with hacking records accused of wiping 96 govt databases – Lifeboat News: The Blog
Cyber Crime

Contractors with hacking records accused of wiping 96 govt databases – Lifeboat News: The Blog

December 7, 2025
Maryland man sentenced for N. Korea IT worker scheme involving US government contracts
Cyber Crime

Maryland man sentenced for N. Korea IT worker scheme involving US government contracts

December 7, 2025
Next Post
Automate 80% of IT Tickets with Natural Language Workflows

Automate 80% of IT Tickets with Natural Language Workflows

Self-Replicating Worm Hits 180+ Software Packages – Krebs on Security

Self-Replicating Worm Hits 180+ Software Packages – Krebs on Security

Recommended Stories

تعلم الامن السيبراني من الصفر – أفضل كورسات وشهادات مجانية 2025

تعلم الامن السيبراني من الصفر – أفضل كورسات وشهادات مجانية 2025

November 19, 2025
Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit

Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit

December 3, 2025
Online Transaction से Police ने कैसे पकड़ा Criminal? | Crime Patrol 2.0 | Full Episode

Online Transaction से Police ने कैसे पकड़ा Criminal? | Crime Patrol 2.0 | Full Episode

December 9, 2025

Popular Stories

  • Allianz Life – 1,115,061 breached accounts

    Allianz Life – 1,115,061 breached accounts

    0 shares
    Share 0 Tweet 0
  • Prosper – 17,605,276 breached accounts

    0 shares
    Share 0 Tweet 0
  • साइबर अपराध | Illegal Payment Gateway & Rented Bank Accounts | MAMTA CHOPRA

    0 shares
    Share 0 Tweet 0
  • Miljödata – 870,108 breached accounts

    0 shares
    Share 0 Tweet 0
  • Snowflake Data Breach Explained: Lessons and Protection Strategies

    0 shares
    Share 0 Tweet 0

Search

No Result
View All Result

Recent Posts

  • Top 5 Mobile App Security Threats Leaders Must Prepare for in 2026
  • Microsoft On Women In Cybersecurity At Black Hat Europe 2025 In London
  • Polisi kembali ungkap sindikat Cyber Crime kejahatan Internasional – iNews Malam 09/03

Categories

  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos

Newsletter

© 2025 All rights reserved by cyberinchief.com

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Security
  • Data Breach
  • Mobile Security
  • Videos
  • Advertise
  • Privacy Policy
  • Contact Us

© 2025 All rights reserved by cyberinchief.com

Newsletter Signup

Subscribe to our weekly newsletter below and never miss the latest News.

Enter your email address

Thanks, I’m not interested