Logo
Cybersecurity

Why Threat Hunting Is the Only Way to Stop Attackers Who Are Already Inside

Most organizations detect breaches after 194 days of attacker activity already inside their network. ITSEC Asia, the cybersecurity leader in Indonesia, explains why Threat Hunting is the proactive discipline that changes that equation for good.

Ajeng HadeAjeng Hade
|
Mei 12, 2026
Why Threat Hunting Is the Only Way to Stop Attackers Who Are Already Inside

Introduction

Here is a question every security leader should sit with: if an attacker entered your network six months ago, would you know? According to IBM's Cost of a Data Breach Report 2024, the average time to identify a breach now stands at 194 days, nearly half a year of undetected attacker activity operating freely within enterprise infrastructure. Prevention tools, no matter how sophisticated, have already demonstrated they cannot close that window on their own. Firewalls, antivirus software, and multi-factor authentication are necessary. They are not sufficient.

The organizations that understand this distinction are the ones investing in threat hunting: the proactive, intelligence-driven practice of searching for adversaries who have already bypassed the perimeter and are operating in silence. ITSEC Asia, the cybersecurity leader in Indonesia with operations across Singapore, Australia, and the UAE, works with organizations across these regions to build this exact capability before the next breach makes it urgent.

Sources: IBM Cost of a Data Breach Report 2024

The Gap That Reactive Security Cannot Close

The fundamental flaw in reactive cybersecurity is architectural. Security Operations Centers monitor known threat signatures and fire alerts when something matches an established pattern. Endpoint detection tools watch for behaviors that resemble known malware. These systems are valuable, but they are built around what is already understood. Sophisticated threat actors, including nation-state groups and advanced ransomware operators, have spent years learning how to operate within the boundaries of what detection systems consider normal.

CrowdStrike's Global Threat Report documents how attacker breakout time (the window between initial access and lateral movement through a network) has collapsed to just 62 minutes for the fastest observed intrusions, with the average sitting at under three hours. By the time a signature-based alert fires, the attacker has already moved. Threat hunting inverts this dynamic entirely. Rather than waiting for an alert to signal that something went wrong, threat hunters operate from the assumption that a capable attacker is already present and begin searching the environment for indicators of that presence. It is the difference between responding to fire alarms and sending investigators to find smoldering wires before the building ignites.

Sources: CrowdStrike Global Threat Report 2024 · IBM Cost of a Data Breach Report 2024

How Threat Hunting Actually Works

Threat hunting is a hypothesis-driven discipline, not a passive monitoring function. A threat hunter begins with an assumption grounded in threat intelligence and then queries the environment specifically for evidence of adversarial behavior. This process relies on high-fidelity telemetry: comprehensive endpoint logs, network flow data, authentication records, and cloud activity feeds that provide the raw material for investigation. According to SANS Institute research on threat hunting maturity, organizations at higher maturity levels move from ad hoc investigation to structured, repeatable hunt programs with defined hypotheses, documented procedures, and measurable outcomes.

A mature threat hunting program typically operates across three core activities: 

• Hypothesis Formation: Each hunt begins with a threat intelligence-informed assumption, for example that a specific actor group known to target financial institutions tends to abuse Windows Management Instrumentation for lateral movement, and then validates or disproves that assumption through deep log analysis.

• Telemetry Analysis: Hunters examine endpoint behavior, authentication anomalies, unusual network flows, and privilege escalation patterns that automated tools routinely miss because they do not match known-bad signatures.

• Detection Engineering: Every completed hunt, whether it surfaces an attacker or confirms a clean environment, produces refined detection logic that improves the automated systems the SOC relies on going forward.

MITRE ATT&CK, the globally recognized framework cataloging adversary tactics, techniques, and procedures, provides the structured vocabulary threat hunters use to formulate hypotheses and ensure consistent coverage across the kill chain. Organizations that align their hunting programs to ATT&CK demonstrate systematic thinking about attacker behavior rather than chasing individual incidents in isolation.

Sources: SANS Institute: Threat Hunting Maturity Model · MITRE ATT&CK Framework

The Industries That Cannot Wait for an Alert

The consequences of skipping threat hunting are not evenly distributed. Organizations in healthcare, financial services, critical infrastructure, and telecommunications carry disproportionate risk because they hold data and control systems that sophisticated adversaries explicitly prioritize. The Ponemon Institute's 2024 research places the average cost of a healthcare data breach at USD 9.77 million, the highest of any sector for the fourteenth consecutive year. These numbers are not driven primarily by the cost of breach response. They are driven by the cost of undetected attacker dwell time: the months during which an adversary moved through a network, exfiltrated data, and established persistence before anyone noticed.

Regulatory frameworks governing these industries have also begun to reflect this reality. NIST's Cybersecurity Framework 2.0 explicitly incorporates continuous monitoring and proactive threat detection as core security functions. Regulators in Indonesia through BSSN's national cybersecurity strategy and internationally through frameworks like the EU's NIS2 Directive increasingly expect organizations to demonstrate active threat detection capability, not merely perimeter defense. For organizations operating in these environments, the question is no longer whether threat hunting belongs in the security program. It is whether the capability is mature enough to be effective when it is needed most.

Sources: Ponemon Institute Data Breach Research · NIST Cybersecurity Framework 2.0 · BSSN National Cybersecurity Strategy

Build Threat Hunting Readiness Before the Incident Forces It

The organizations that keep getting compromised twice are not unlucky. They are operating without the investigative and proactive capability that would tell them, with certainty, whether an attacker is present right now and what changed after the last incident. Threat hunting closes that gap by turning passive telemetry into active intelligence and converting security spend from a reactive cost center into a genuine risk reduction function.

The time to build this capability is before an attacker makes it necessary. ITSEC Asia provides threat hunting, digital forensics, and incident response capabilities for organizations across Indonesia, Singapore, Australia, and the UAE. If your organization wants to assess its current threat hunting maturity or build proactive detection capability before an incident forces the conversation, speak with our security specialists.

👉 Consult with our security specialists https://itsec.asia/contact

Share this post

You may also like

What Is Cloud Security? A First Introduction for Modern Enterprises
Cybersecurity

What Is Cloud Security? A First Introduction for Modern Enterprises

INTRODUCTION: CLOUD ADOPTION IS ACCELERATING, SO ARE THE RISKS Cloud computing has been part of enterprise IT for years, but the risk landscape around it is changing faster than ever. As organizations embrace AI, remote work, and digital transformation, cloud environments have become the backbone of business operations and a prime target for attackers. Today, breaches are no longer limited to traditional data centers. Misconfigured cloud resources, stolen credentials, and unmanaged identities are now among the most common root causes of security incidents. This is why understanding what cloud security is and what it is not matters deeply for enterprises today. At its core, cloud security refers to the policies, technologies, configurations, and responsibilities that protect cloud-based systems, data, and services. This concept is inseparable from how cloud computing itself is defined:an on demand, shared,and externally managed computing model, as outlined in the NIST [https://csrc.nist.gov/pubs/sp/800/145/final]Cloud Computing Definition (SP 800-145), where responsibility is inherently distributed between the provider and the user. WHAT IS CLOUD COMPUTING? A SIMPLE ENTERPRISE PERSPECTIVE Cloud computing is not

ITSEC AsiaITSEC Asia
|
Feb 12, 2026 7 minutes read
Why Cybersecurity Awareness Matters for Modern Enterprises
Cybersecurity

Why Cybersecurity Awareness Matters for Modern Enterprises

INTRODUCTION As organizations accelerate digital transformation through cloud adoption, remote work, and AI-driven systems, the nature of cyber risk continues to evolve. Security challenges are no longer limited to technical vulnerabilities alone. Increasingly, attackers exploit human behavior, trust, and routine workflows to gain unauthorized access to systems and sensitive data. Phishing campaigns, social engineering tactics, and impersonation attacks have grown more sophisticated and harder to detect. Industry guidance from ENISA [https://www.enisa.europa.eu/] highlights that human-centric attack techniques remain among the most effective methods used against organizations today. In this context, cybersecurity awareness has become a critical factor in determining how effectively enterprises can prevent, detect, and respond to cyber threats. This article explains why cybersecurity awareness is important, the challenges enterprises face in building it, and how awareness strengthens overall cybersecurity resilience. WHAT IS CYBERSECURITY AWARENESS? According to findings highlighted in the Verizon Data Breach Investigations Report (DBIR), [https://www.verizon.com/business/resources/reports/dbir/]human interaction continues to play a significant role in successful cyber incidents. In enterprise environments, cybersecurity awareness is not limited to IT or security teams. It applies to every

ITSEC AsiaITSEC Asia
|
Jan 19, 2026 4 minutes read
Four Strong Reasons to Use an MSSP
Cybersecurity

Four Strong Reasons to Use an MSSP

Test

The multitude of challenges to be faced is the main reason why most organizations today are turning to managed security service providers (MSSPs) to help them address these issues. The challenges of strengthening human resources, processes, and technologies as efforts to secure their intellectual property and data appropriately, while still complying with cybersecurity regulations, can be a daunting task even for well-managed IT departments. With these considerations in mind, here are four main reasons why I prefer MSSPs over in-house security. USING MSSP SAVES YOU MONEY Building, running, and maintaining a cybersecurity ecosystem comes with significant costs. One of the reasons is that many software solutions require specialized hardware and equipment to run, and they often come with recurring licensing costs. Additionally, the salaries of cybersecurity employees and the training they need to effectively utilize new tools and technologies add to the expenses. One of the CFO's favorite aspects of using MSSP is that it can replace the capital expenditures often needed to add new tools with a large

ITSEC AsiaITSEC Asia
|
Jul 10, 2023 5 minutes read

Receive weekly
updates on new posts

Subscribe