misp-website/content/events.md

58 lines
2.0 KiB
Markdown
Executable File
Raw Blame History

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

---
layout: page
title: MISP-related events
permalink: /events/
toc: true
---
## MISP Events
Want to join us at an event, discuss opportunities or projects around the MISP project, share your experience about threat intelligence or discuss how MISP could be improved to support security professionals?
### MISP Hackathon
The previous Hackaton was in October 2021: [Open Source Security Hackathon](/hackathon/)
### Conferences
### Public MISP trainings
- #### MISP Best Practices for encoding threat intelligence (3 hours - online)
*When:* {{< fixedtime `15th December 09:00-12:00 CET` `MISP Best Practices for encoding threat intelligence` `20221215T12` `3` >}}</a>
*Where:* Remote (Zoom and online MISP training instance)
*Price:* Free
*Summary agenda:*
- MISP data model
- Best practices - from evidences to actionable evidences
- Leverage the information in MISP to make threat landscape report
*Event link:* [Zoom link](https://us02web.zoom.us/j/81768507425?pwd=VkRwWXRIc0RXOWZ4ODdSVnFPQ0Jadz09)
- #### MISP Workflow (2 hours)
*When:* {{< fixedtime `15th December 2022 14:00-16:00 CET` `MISP Workflow` `20221215T12` `3` >}}</a>
*Where:* Remote (Zoom and online MISP training instance)
*Price:* Free
*Summary agenda:*
MISP has been a widely used open source CTI platform for the past decade, with a long list of tools that allow users to customise the data models and contextualisation of the platform, yet true customisation of the actual workflows and processes had to be done externally using custom scripts.
With the introduction of [MISP workflows](https://www.misp-project.org/2022/08/08/MISP.2.4.160.released.html/), this has changed and the workshop aims to walk the audience through some of the potential ideas of how one could adapt the tool to their own CSIRTs or SOCs workflows by using some useful examples during the session.
*Event link:* [Zoom Link](https://us02web.zoom.us/j/83982836437?pwd=SHlLL2J2V1hPZnp4TmhpWmQwbFN6Zz09)
### Past events
You can find past events [here](/past-events/).