ThreatQuotient

Leveraging MISP and TheHive in your CTI Practice

Thursday 29th April at 3pm BST / 10am EDT

 

When building a Threat Intelligence Practice, it is important to determine a methodology that covers all aspects of intelligence. The latter ensures that what is created can be used effectively on the operational, tactical and strategic levels and to be able to monitor the state of exposure of your defense in relation to a priority threat.

Most cybersecurity professionals use commercial solutions as well as OSINT (Open Source Intelligence)  for this process. 

In this webinar, we will demonstrate how integrating MISP and TheHive correctly in your CTI Program can help you gain a new security posture:

  • Best practice to link TheHive and MISP to your Security Operations

  • Learn more from your incidentology and share relevant information

  • Develop a CTI methodology

The Presenters

Anthony Perridge

VP International

Syed Kaptan

Threat Intelligence Engineer

 

Watch On-Demand!

 
ThreatQuotient

Copyright © 2021, ThreatQuotient, Inc. All Rights Reserved.