What is MISP threat intelligence sharing platform, and how can you play with the threat intelligence feeds? This short demo shows you how to access the default data feeds provided by the CIRCL virtual machine. While MISP's greatest strength is to automate your network defences to block and filter known threats, it is also an incredibly useful database for threat research and incident response analysis. In future videos, I will show you how to use other features, but this is a brief introduction. 4:18 Start of the demo Links in video: Link to VM: ---- HEFESTIS: ---- Follow Me Online Here: LinkedIn: Jordan's site: ---- Check out my Cyber Security books: "Advanced Persistent Training" "Cask Strength Security Non-Compliance: Four Ways to Respond When Someone Breaches Cybersecurity Policy" ---- CPE entry (CSV): Link, Type, Title, Presenter, Year Published, Domain, Length , video/webinar, Intro to MISP, Jordan M Schroeder, 2020, Security Operations, 9:00









