John Althouse, Detection Bro, Ops Track

Subscribers:
6,000
Published on ● Video Link: https://www.youtube.com/watch?v=31fyOSZVe4A



Duration: 25:20
2 views
0


ACoD hacking Conference 2017




Other Videos By All Hacking Cons


2021-10-07Sounil Yu, How I Learned to Stop Information Sharing and Love the DIKW, Ops Track
2021-10-07Sam Wilson, Logging the next trillion events, Ops Track
2021-10-07Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track
2021-10-07Carlos Sanchez, Apache Spot, Opa Track
2021-10-07Bryan Zimmer, Location Independent Security Approach LISA, Ops Track
2021-10-07Alex Pinto, Beyond Matching Applying Data Science Techniques to IOC based Detection, Ops Track
2021-10-07Alban Diquet, TrustKit A defensive library to protect communication on mobile apps, Ops Track
2021-10-07Aaron Shelmire, Decreasing Dwell Time, Ops Track
2021-10-07Rich Mogull, Building the Easy Button Five ish Ways to Radically Automate SecOps, Ops track
2021-10-07John Brown, Drop packets really fast with BGP, uRPF and Exa BGP, Ops Track
2021-10-07John Althouse, Detection Bro, Ops Track
2021-10-07Joe Stewart feat Inbar Raz, Researcher Conferences Suck
2021-10-07Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track
2021-10-07Ido Safruti, Abusing Google and Facebook login, Ops Track
2021-10-07Ido Safruti, Abusing Google and Facebook login On the risks in trusting , Ops Track
2021-10-07Eugene Kogan, Practical Advice for Cloud Security Monitoring, Ops Track
2021-10-07Conference Intro feat Gadi Evron, Stop Putting Attackers on A Pedestal
2021-10-06Holograma Seguridad Informática Rueda de Prensa ACK Security Conference
2021-10-06Jairo asistente al ACK Security Conference
2021-10-06Jeyson y Juan David asistentes al ACK Security Conference, nos dejan sus comentarios
2021-10-06Leonardo Pigñer nos deja sus comentarios sobre el ACK Security Conference



Tags:
hacking
conference
hacker
old school
hacking conference
defcon
infosec
opsec
IT
information technology
information security
dybersecurity
ethicalhacking
pentesting
tech
cyber
cybercrime
malware
hacks
datasecurity
software
android
iphone
ios
iot
programming
coding