Combining SOAR & Threat Intel: MISP Automation
VP of Security Services
Technical Account Manager
Documenting indicators of compromise (IOCs) is a crucial part of the investigation process for security analysts today. The MISP open-source threat intelligence project provides a fast-growing database that can be used to cross-reference known IOCs.
MISP can also now be integrated into your SOAR playbooks to ensure these IOCs are automatically integrated into your team’s investigation workflows.
In this webinar, hear experts from Siemplify and leading service provider NovaCoast to learn:
- How MISP threat data can be integrated into your SOC workflows.
- The role of automation in security investigations that reference IOC’s in the open-source MISP database.
- A real-world threat-based scenario and demo of how to include MISP within the Siemplify Security Operations Platform for faster, automated investigation and response.
- A live Q&A session for those of you working on projects in this area and want to ask our practitioners questions on your use cases.