3 Presentations about MISP or mentioning MISP
David André edited this page 2016-03-16 22:25:28 +01:00
This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

  1. Troopers 2016 - THE KINGS IN YOUR CASTLE - All the lame threats that own you but will never make you famous
  2. ENISA 2016 Cyber-defense Exercise will use MISP
  3. MISP mentioned in a VB2015 conference paper on Building a malware lab in the age of big data
  4. MISP mentioned in a master thesis Exchanging threat information between semi-honest parties by Anton Jongsma
  5. Ops-Trust, presentation by Paul Vixie at FIRST 2014
  6. NATO Communications and Information Agency using MISP
  7. NATO Smart Defence Project to use MISP
  8. CERT-EU (EU Instutions coordinating CERT) using MISP
  9. MISP, one of the solutions recommended for improving threat data exchange amond CERT, report by ENISA
  10. MISP, one of the tools for exchange and processing of actionable information, report by ENISA
  11. CSIRT Maturity Kit, A step-by-step guide towards enhancing CSIRT Maturity, a report by National Cyber Security Centre, The Netherlands
  12. MISP community hosted by CIRCL (Luxembourg's CERT)
  13. Belgian Defence using MISP mentioned in its Cybersecurity Strategy
  14. The Good, the Bad & the Ugly Information sharing experience - 2 years of challenges resumed in 15 minutes - CIRCL NISHA Workshop in Zurich
  15. Malware Information Sharing Platform or How to Share Efficiently IOCs Within a Country - CIRCL July 29, 2013 - presentation for the private sector
  16. #Honeynet2014 - Andrzej Dereszowski - MISP - NATOs' approach to cyber threat information exchange
  17. Chapitre XI, Surveillance des systèmes d'informations (Chapter XI, Information systems monitoring) by Commission de surveillance du secteur financier du Luxembourg (Financial Sector Supervisory Commission Luxembourg). Full report.
  18. MISP presentation and installation instructions in Korean. 1.Building instantly exploitable protection for yourself and your partners against targeted cyber threats using MISP by Andras Iklody (CIRCL) at FIRST 2015 Conference.
  19. MISP Le partage dIOC malware sans tourner autour du pot by Christophe Vandeplas at the RMLL (Rencontres Mondiales du Logiciel Libre).
  20. Attackers benefit from sharing information. How can you benefit, too? by Alexandre Dulaunoy (CIRCL) at ICTSpring.
  21. Sharing Threat Indicators and Security Ranking, an opportunity for the Internet Community by Alexandre Dulaunoy (CIRCL).
  22. New ZeroMQ functionality in MISP by Alexandre Dulaunoy (CIRCL).
  23. Automated Defense - Using Threat Intelligence to Augment by Paul Poputa-Clean