Home > Resources > On-Demand: Combining SOAR & Threat Intel: MISP Automation
On-Demand Webinar

Combining SOAR & Threat Intel: MISP Automation

Presented by:

Jon Poon

VP of Security Services

Arnaud Loos

Technical Account Manager

Documenting indicators of compromise (IOCs) is a crucial part of the investigation process for security analysts today. The MISP open-source threat intelligence project provides a fast-growing database that can be used to cross-reference known IOCs.

MISP can also now be integrated into your SOAR playbooks to ensure these IOCs are automatically integrated into your team’s investigation workflows.

In this webinar, hear experts from Siemplify and leading service provider NovaCoast to learn:

  • How MISP threat data can be integrated into your SOC workflows.
  • The role of automation in security investigations that reference IOC’s in the open-source MISP database.
  • A real-world threat-based scenario and demo of how to include MISP within the Siemplify Security Operations Platform for faster, automated investigation and response.
  • A live Q&A session for those of you working on projects in this area and want to ask our practitioners questions on your use cases.