Security automation: from idea to tool

In today’s rapidly evolving cybersecurity landscape, manual threat detection processes struggle to keep pace with the growing sophistication and volume of cyberattacks. Threat hunting, the proactive approach to detecting and neutralizing advanced threats, can be a time-consuming and resource-intensive task. Automation, coupled with open-source tools, offers an efficient and cost-effective way to enhance threat hunting capabilities.

In this video we explore the approach of threat hunting automation using widely available open-source tools, such as MISP, Shuffle, RTIR, IntelOwl. We will discuss how automation frameworks streamline data collection, false-positive management, and incident response, significantly reducing response times and enabling more efficient use of cybersecurity resources.

The session includes:

  • Real-world use cases
  • Tool demonstrations
  • Best practices for implementing automated threat hunting in CSIRTs and SOCs of various sizes

Other news and stories

What impact might NIS2 have on Africa?
What impact might NIS2 have on Africa?
What impact might NIS2 have on South America?
What impact might NIS2 have on South America?
How Lithuania stepped up its game with the NIS2 directive
How Lithuania stepped up its game with the NIS2 directive
SOCcare May 2025 Malpeek: Analysis of a "copyright infringement" malware
SOCcare May 2025 Malpeek: Analysis of a "copyright infringement" malware
NRD Cyber Security recorded strong growth and international expansion in 2024
NRD Cyber Security recorded strong growth and international expansion in 2024
Building awareness is a continuous effort
Building awareness is a continuous effort
Facilitating dialogue on NIS2 within the Lithuanian cybersecurity ecosystem
Facilitating dialogue on NIS2 within the Lithuanian cybersecurity ecosystem
Developing a culture of CTI sharing in Lithuania
Developing a culture of CTI sharing in Lithuania