• Most recent
  • Conferences
  • For organizers
  • The rig
  • Buy me a Mate
  • Search
  • Fundraiser
  • Bluesky
  • 2023
  • 2022
Edition logo

CTIS-Summit 2022

2022-10-19 - 2022-10-20
  • Thumbnail for the video - click to play

    ►

    Ethical Internet Scanning In 2022
    - Patrice Auffret
  • Thumbnail for the video - click to play

    ►

    In Curation We Trust: Generating Contextual And Actionable Threat Intelligence
    - Robert Nixon
  • Thumbnail for the video - click to play

    ►

    Visualize The Potential: MISP To Power BI
    - Robert Nixon
  • Thumbnail for the video - click to play

    ►

    What Can Time Based Analysis Say In Ransomware Cases?
    - David Rufenacht and Jorina Baron
  • Thumbnail for the video - click to play

    ►

    MISP Workflow: An Improved Way To Support Your CTI Pipelines
    - Sami Mokaddem
  • Thumbnail for the video - click to play

    ►

    LT: Typosquatting-finder: Overview And Demo
    - David Cruciani
  • Thumbnail for the video - click to play

    ►

    LT: ATAK
    - JL
  • Thumbnail for the video - click to play

    ►

    LT: AIL-Framework New Version
    - Aurel
  • Thumbnail for the video - click to play

    ►

    HZ Rat Goes China: Following The Tail Of An Unknown Backdoor
    - Axel Wauer
  • Thumbnail for the video - click to play

    ►

    What's HOT In MISPland: Latest Development And Roadmap Update
    - Andras Iklody
  • Thumbnail for the video - click to play

    ►

    Sharing IOC With Customers And Partners
    - Cyril Bras
  • Thumbnail for the video - click to play

    ►

    MISP Web Scraper
    - Koen Van Impe
  • Thumbnail for the video - click to play

    ►

    Scaling MISP With The Cloud
    - Mikesh Nagar
  • Video will not be published
    Actors And Threats Targeting Telecom Signalling Networks
    - Alexandre De Oliveira
  • Thumbnail for the video - click to play

    ►

    Exploring Internet Services: Exposing Vulnerabilities And Misconfigurations At Scale
    - Gregory Boddin
  • Thumbnail for the video - click to play

    ►

    Communities – The Underestimated Super Power Of Cyber Threat Intelligence
    - Markus Ludwig
  • Thumbnail for the video - click to play

    ►

    How To Fail Your CTI Usage
    - Paul Jung
  • Thumbnail for the video - click to play

    ►

    Why Does Strategic Threat Intelligence Matter?
    - Louise Taggart
  • Thumbnail for the video - click to play

    ►

    How To Meet Operational Challenges When Working With MISP On An Air-gapped Network
    - Olivier Memin & Victor Barrault
  • Thumbnail for the video - click to play

    ►

    Webshells In 2022
    - Paul Rascagneres & Robert Jan Mora
  • Thumbnail for the video - click to play

    ►

    LT: MISP-Guard
    - Luciano
  • Thumbnail for the video - click to play

    ►

    LT: Hardware Keylogger Forensics: Are There Any Potential IoCs?
    - Michael
  • Thumbnail for the video - click to play

    ►

    LT: TLP, PAP, Just The Two Of Us
    - Olivier Memin
  • Thumbnail for the video - click to play

    ►

    LT: Ransomlook.io
    - Alexandre Dulaunoy
  • Thumbnail for the video - click to play

    ►

    LT: iocmite
    - Sebastien Larinier
  • Thumbnail for the video - click to play

    ►

    LT: News From The Automation Department
    - Sascha Rommelfangen
  • Thumbnail for the video - click to play

    ►

    DocIntel: A Context-Centric Threat Intelligence Platform
    - Antoine Cailliau
  • Video will not be published
    Report Curation And Threat Library: How To Organize Your Knowledge
    - Patrick Grau
  • Thumbnail for the video - click to play

    ►

    CTI Operational Procedures With Jupyter Notebooks And MISP
    - Koen Van Impe
  • Thumbnail for the video - click to play

    ►

    The Holy Grail For STIX And MISP Format - Misp-stix
    - Christian Studer
  • Thumbnail for the video - click to play

    ►

    WHIDS Update
    - Quentin Jerome
  • Thumbnail for the video - click to play

    ►

    Community Orchestration Via Cerebrate
    - Andras Iklody