An organization regularly scans its networks and systems for vulnerabilities, but wants to take a more proactive stance in security by seeking out signs of unknown threats. Which of the following activities would best accomplish this goal?
Configuring automated alerts to notify when predefined security conditions are met
Conducting regular threat hunting exercises to search for indicators of compromise or potential threats
Performing red team exercises to simulate potential adversary actions
Completing a vulnerability assessment to patch identified security weaknesses