Screenshot of Code

Bad Will Hunting

It’s one thing to remediate the issues that arise from a breach. It’s quite another to analyze the breach data and go looking for the culprit in order to shut them down or at least build defenses against them.

This 20/20 looks at a different type of information security approach. Rather than the defensive, reactive responsibilities traditional considered part of the data security team, today we look at the proactive, more aggressive hunt teams.