To access Identifying Suspicious Traffic with DASH, you need to Login or Register to APNIC Academy.

Register nowLogin

Webinar: Identifying Suspicious Traffic with DASH

This webinar will cover possible ways to get access threat information. Some use cases for using threat information to improve your security and using tools such as MISP to manage threat information and more.

This webinar will cover the following topics:

  • Possible ways to get access threat information / intelligence 
  • Use cases for using threat information to improve your  security 
  • Using tool such as MISP (www.misp-project.org)  to gather and manage threat information 
  • Creating a community that shares threat related information 
  • Highlights of the APNIC Community Threat Sharing Initiative

Upcoming webinars