New frameworks are putting threat hunting programs within reach for organizations of all sizes. Now the landscape has shifted from primarily an on-premises proposition to the cloud. How should cybersecurity threat hunting efforts adapt? What new types of threats reside in the cloud? How do threat hunters pivot from on-prem to the cloud, or toggle between the two environments in their quest to stay ahead of an attack?