derbycon closing

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=zGa_IxXRDgE



Duration: 54:14
2 views
0


DerbyCon 1 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-04-26derbycon d2t2t1 brian baskin walking the green mile how to get fired after a security incident
2022-04-26derbycon d2t3t7 jimmy shah mobile app moolah profit taking with mobile malware
2022-04-26derbycon d3t3t3 mick douglas blue team is sexy refocusing on defense part ii all you baseline are be
2022-04-26derbycon d2t1t11 tottenkoph data mining for neuro hackers
2022-04-26derbycon d3t3t2 kyle osborne kos the hidden xss attacking the desktop
2022-04-26derbycon d2t3t6 ben feinstein and jeff jarmoc get off of my cloud cloud credential compromise and ex
2022-04-26derbycon d2t1t9 rick redman tomorrow you can patch that 0day but your users will still get you p0wn3
2022-04-26derbycon d3t3t1 chris roberts a tribute to dr strangelove
2022-04-26derbycon d2t3t5 infojanitor virtual trust virtual permission and the illusion of security
2022-04-26derbycon d2t1t8 int0x80 of dual core anti forensics for the louise
2022-04-26derbycon closing
2022-04-26derbycon d2t3t4 bill sempf is locksport a sport
2022-04-26derbycon d3t2t6 raphael mudge dirty red team tricks
2022-04-26derbycon d2t1t7 rick hayes karthik rangarajan osint beyond the basics
2022-04-26derbycon d2t3t3 larry pesce you are the smart meter making and hacking of the 2011 ma ccdc electroni
2022-04-26derbycon d3t2t5 deviant ollam distinguishing lockpicks raking vs lifting vs jiggling and more
2022-04-26derbycon d2t1t6 rafal los youre going to need a bigger shovel a critical look at software security a
2022-04-26derbycon d2t1t5 tony huffman myne us when fuzzers miss the no hanging fruit
2022-04-26derbycon d2t3t2 rob simon pentesting over powerlines
2022-04-26derbycon d2t2t11 adrian crenshaw building a svartkast cheap hardware to leave behind on someone else
2022-04-26derbycon d3t2t2 jayson e street steal everything kill everyone cause total financial ruin or how i w



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering