How building a better hacker accidentally built a better defender Casey Ellis DerbyCon 4

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=Y5YJSPsuR3g



Duration: 42:42
2 views
0


DerbyCon 4 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-04-29Exploiting Browsers Like A Boss w WhiteLightning Bryce Kunz DerbyCon 4
2022-04-29Passing the Torch Old School Red Teaming New School Tactics David McGuire and Will Schroeder Derby
2022-04-29Macro Malware Lives Putting the sexy back into MS Office document macros Joff Thyer DerbyCon 4
2022-04-29Around the world in 80 Cons Jayson E Street DerbyCon 4
2022-04-29How to Give the Best Pen Test of Your Life Ed Skoudis DerbyCon 4
2022-04-29Ethical Control Ethics and Privacy in a Target Rich Environment Kevin Johnson and James Jardine De
2022-04-29Are You a Janitor Or a Cleaner John Stauffacher and Matt Hoy DerbyCon 4
2022-04-29Application Whitelisting Be Careful Where The Silver Bullet Is Aimed David McCartney DerbyCon 4
2022-04-29How not to suck at pen testing John Strand DerbyCon 4
2022-04-29Advanced Red Teaming All Your Badges Are Belong To Us Eric Smith DerbyCon 4
2022-04-29How building a better hacker accidentally built a better defender Casey Ellis DerbyCon 4
2022-04-29Et tu Kerberos Christopher Campbell DerbyCon 4
2022-04-29Just What The Doctor Ordered Scott Erven DerbyCon 4
2022-04-29Hiding the breadcrumbs Forensics and anti forensics on SAP systems Juan Perez Etchegoyen DerbyCon
2022-04-29Electronic locks in firearms Oh My Travis Hartman DerbyCon 4
2022-04-29PassCrackNet When everything else fails just crack hashes Adam Ringwood DerbyCon 4
2022-04-29Advanced Incident Response with Bro Liam Randall hectaman DerbyCon 4
2022-04-29Parenting In Infosec Rafal Los DerbyCon 4
2022-04-29Hardware Tamper Resistance Why and How Ryan Lackey DerbyCon 4
2022-04-29Hacking The Media For Fame And Profit Jenn Ellis Steven Regan DerbyCon 4
2022-04-29DNS Based Authentication of Named Entities DANE Can we fix our broken CA model Tony Cargile DerbyC



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering