In this section
TH0.13 Building the Leadership Case
The audience determines the argument
Technical stakeholders (CISO, security architects) respond to the detection gap data from TH0.1 and the structural limitation arguments from TH0.4. They understand coverage ratios, ATT&CK mappings, and dwell time.
Business stakeholders (CFO, CTO, CEO, board) do not. They respond to risk in financial terms — what does the gap cost us if exploited, what does closing the gap cost, and what is the return on that investment? TH0.7 provides the numbers. This subsection provides the framing.
// Generate your specific numbers for the leadership case
// Run all three queries and record the outputs
// Query 1: Your detection coverage ratio
let coveredTechniques = SecurityAlert
| where TimeGenerated > ago(90d)
| where ProviderName == "ASI Scheduled Alerts"
| extend Techniques = tostring(
parse_json(ExtendedProperties).["Techniques"])
| where isnotempty(Techniques) and Techniques != "[]"
| summarize by Techniques
| count;
// Your numerator: ____ techniques covered
// Your denominator (from ATT&CK Navigator): ____ techniques relevant
// Your ratio: ____%
// Query 2: Your dwell time baseline
SecurityIncident
| where TimeGenerated > ago(180d)
| where Status == "Closed"
| extend EarliestEvidence = todatetime(
parse_json(tostring(AdditionalData)).firstActivityTimeUtc)
| where isnotempty(EarliestEvidence)
| extend DwellDays = datetime_diff('day', CreatedTime, EarliestEvidence)
| where DwellDays >= 0 and DwellDays < 365
| summarize Median = percentile(DwellDays, 50),
P90 = percentile(DwellDays, 90),
Count = count()
// Your median: ____ days | P90: ____ days
// Query 3: Your incident volume (for break-even calculation)
SecurityIncident
| where TimeGenerated > ago(365d)
| summarize TotalIncidents = count(),
HighSeverity = countif(Severity == "High")
// Annual incidents: ____ | High severity: ____Try it yourself
Exercise: Draft your elevator pitch
Using the numbers from the KQL queries above (or estimates if you have not run them yet), write your 60-second elevator pitch. Fill in the blanks from the template in this subsection with your actual data.
Then read it aloud. If it takes more than 60 seconds, cut. If it uses technical terms the CFO would not understand (ATT&CK, KQL, Sentinel, analytics rules), replace them with business language (detection system, attack techniques, coverage gap, security monitoring).
Save the pitch. You will use it.
The language translation problem
Security teams speak in TTPs, MITRE techniques, and detection coverage percentages. Leadership speaks in business risk, financial impact, and competitive advantage. The leadership case must translate: "We have 0% detection coverage for T1021.001 (RDP lateral movement)" becomes "An attacker who compromises one workstation can reach our financial systems undetected because we have no monitoring for the specific technique they use to move between systems. The CHAIN-MESH attack at NE demonstrated this gap — the attacker traversed from Edinburgh to Sheffield manufacturing in 12 minutes without triggering a single alert." The MITRE reference goes in the appendix. The business impact goes in the executive summary.
The queries developed during this exercise become reusable templates in your personal hunting library. Parameterise the hardcoded values (user names, IP addresses, time windows) and add a header comment explaining the hypothesis each query tests. A mature hunting program maintains 50-100 parameterised query templates that any team member can execute — reducing the per-hunt preparation time from hours to minutes and ensuring consistent methodology across analysts.
The most compelling leadership cases include a cost comparison: the cost of the hunting program (analyst time, tooling) versus the cost of a single undetected breach. At NE, the CHAIN-MESH ransomware encrypted 200 engineering files on the manufacturing server. The recovery cost — not including reputational damage — exceeded $225,000. The annual hunting program budget is $57,000. One successful hunt that detects a ransomware precursor before encryption pays for the entire program four times over. Frame the investment in these terms.
The myth: The ATT&CK coverage heatmap — red squares for uncovered techniques, green for covered — is a compelling visual that will persuade leadership to fund hunting.
The reality: The heatmap persuades technical stakeholders who understand ATT&CK. Business stakeholders see colored squares without operational context. They do not know that T1098.003 matters more than T1595.001 for their environment, or that a red square represents a specific business risk. The heatmap is supporting evidence for the CISO. The financial case — program cost vs incident cost avoidance — is the argument for the CFO. Use the right evidence for the right audience.
Extend this approach
If your organization has experienced a significant security incident in the past 12–24 months, the leadership case has an additional lever: "If we had been hunting at the time of [incident reference], we would have discovered the attacker [N days] earlier — during the persistence phase rather than the execution phase. The remediation cost, regulatory exposure, and business disruption would have been significantly lower." This is not hypothetical — use the incident's actual dwell time and actual remediation cost to make it concrete. Recent incidents create organizational memory that makes the hunting argument tangible in a way that industry statistics alone cannot.
References Used in This Subsection
- IBM Security. "Cost of a Data Breach Report 2023." — internal vs external discovery cost differential
- Course cross-references: TH0.1 (coverage ratio), TH0.2 (dwell time), TH0.7 (ROI model), TH0.9 (myth responses for Q&A)
You have time for one hunt this quarter. Do you hunt for the threat in the latest advisory or for the gap in your ATT&CK coverage matrix?
Hunt the coverage gap. Advisories describe threats that are CURRENT but may not target NE. Coverage gaps describe techniques that COULD target NE and would succeed undetected. The coverage gap hunt produces a detection rule (closing the gap permanently). The advisory-driven hunt produces a point-in-time assessment (confirming the specific threat is not present today). Both are valuable — but the coverage gap hunt has a longer-lasting impact because it produces a permanent detection improvement.
You understand the detection gap and the hunt cycle.
TH0 showed you what detection rules fundamentally cannot catch. TH1 gave you the hypothesis-driven methodology that closes that gap. Now you run the hunts.
- 10 complete hunt campaigns — from hypothesis through KQL execution through finding disposition, each campaign based on a real TTP
- 70 production hunt queries — every one mapped to MITRE ATT&CK and tested against realistic telemetry
- Advanced KQL for hunting — UEBA composite risk scoring, retroactive IOC sweeps, and hunt management metrics
- Hypothesis-Driven Hunt Toolkit lab pack — 30 days of realistic M365 and endpoint telemetry with multiple attack patterns seeded in
- TH16 — Scaling hunts across a team — the operating model for a production hunt program