MISP: the open-source threat intelligence platform
In this on-demand webcast, presented by Devo security engineering and MISP Projects team members, you'll learn about:
- Cyber threat intelligence: what it is and what is the current market
- The Malware Information Sharing Platform, MISP, and why threat information sharing matters
- Who is using MISP threat sharing platform, and how they incorporate into their security operations
- How Devo integrates MISP threat intelligence into it's next-gen SIEM
Register now to watch the on-demand recording.
Date & Time
Duration: 60 minutes
Watch the Webcast
About the Presenters
Sebastien is the Director of Security Engineering at Devo. He has
worked on numerous open source projects, such as Linux PAM, Prelude IDS, etc. He the lead developer of Faup, a URL Parser which is widely popular. Sebastien is also a board member of the Honeynet Project, a project whose mission is to learn the tools, tactics and motives involved in computer and network attacks, and share the lessons learned.
The MISP Project
Alexandre encountered his first computer in the eighties, and he disassembled it to know how the thing works. Early in his career he worked as senior security network consultant at different places (e.g. Ubizen, now Cybertrust), and co-founded a startup called Conostix, which specialised in information security management. For the past 6 years, he was the manager of global information security at SES, a leading international satellite operator, and is now working at CIRCL in the research and operational fields. He is also a lecturer in information security at Paul-Verlaine University in Metz and the University of Luxembourg. He is also the lead developer of various open source tools including cve-search and member of the MISP core team.
The MISP Project
Andras is a software developer working for CIRCL and has been the main developer of the MISP core software since the beginning of 2013. He is a firm believer that there are no problems that cannot be tackled by building the right tool.