Rise of the Machines using machine learning with GRC Justin Leapline Rick Yocum DerbyCon 9

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=GGpc5IV-6G0



Duration: 41:55
2 views
0


DerbyCon 9 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security DerbyCon was a computer security conference based in Louisville, Kentucky. The first DerbyCon took place in 2011 and was founded by Martin Bos, Dave Kennedy, Alex Kah and Adrian Crenshaw. The conference has been held at the Hyatt Regency Louisville typically in late September.

On January 14, 2019, organizers announced that DerbyCon 9.0, to be held in September 2019, would be the last of the series, citing the increasing difficulty of holding conferences in the face of "a small, yet vocal group of people creating negativity, polarization, and disruption".
DerbyCon common activities included:

Presentations from keynote speakers, with topics including software security, social engineering, cyber security, security in the present day and future, and mobile applications.
Preconference training
Vendors and publishers
Lockpick Village
Mental Health & Wellness Village
BourbonCon, a social gathering during DerbyCon focusing on sampling fine Kentucky Bourbon
DerbyCon Party, which has featured The Crystal Method (2013, 2015) and Infected Mushroom (2014)

Conferences

DerbyCon 2013 Attendee Badge
DerbyCon 1.0 2011
DerbyCon 2.0 "Reunion" 2012
DerbyCon 3.0 "All in the Family" 2013
DerbyCon 4.0 "Family Rootz" 2014
DerbyCon 5.0 "Unity" 2015
DerbyCon 6.0 "Recharge" 2016
DerbyCon 7.0 "Legacy" September 20–24, 2017 at the Hyatt Regency in Louisville, Kentucky
DerbyCon 8.0 "Evolution" October 3–7, 2018 at the Marriott in Louisville, Kentucky

https://web.archive.org/web/20191223065559/https://www.derbycon.com/




Other Videos By All Hacking Cons


2022-05-09Testing Endpoint Protection How Anyone Can Bypass Next Gen AV Kevin Gennuso DerbyCon 9
2022-05-09Well what have we here A year of cyber deception attribution and making attackers rethink their De
2022-05-09Swagger Defense Mick Douglas Pete Petersen DerbyCon 9
2022-05-09Welcome to the Jumble Improving RDP Tooling for Malware Analysis and Pentesting milio Gonzalez Der
2022-05-09Waking up the data engineer in you Jared Atkinson DerbyCon 9
2022-05-09StringSifter Learning to Rank Strings Output for Speedier Malware Analysis Philip Tully Matthew De
2022-05-09The Art of The BEC What Three Years of Fighting Has Taught Us Ronnie Tokazowski DerbyCon 9
2022-05-09Phishing past Mail Protection Controls using Azure Information Protection AIP Oddvar Moe H DerbyCo
2022-05-09Opening Keynote Ed Skoudis DerbyCon 9
2022-05-09One womans journey to CISO leveraging Social Engineering Kate Mullin DerbyCon 9
2022-05-09Rise of the Machines using machine learning with GRC Justin Leapline Rick Yocum DerbyCon 9
2022-05-09RFID sniffing under your nose and in your face Rich Rumble DerbyCon 9
2022-05-09REST in Peace Abusing GraphQL to Attack Underlying Infrastructure Matthew Szymanski DerbyCon 9
2022-05-09Red Team Methodology A Naked Look Jason Lang DerbyCon 9
2022-05-09Red Team Level over 9000 Fusing the powah of NET with a scripting language of your choosing int De
2022-05-09Python Two birds with one stone Andy Cooper DerbyCon 9
2022-05-07Assessing IoT Surveillance Arlo Jimi Sebree DerbyCon 9
2022-05-07Five Mistakes We Wish Users Would Stop Making Lesley Carhart Chelle Clements April C Wright Ama De
2022-05-07Next gen IoT botnets leveraging cloud implementations for shells on 500k IoTs Alex Jay Balan Derby
2022-05-07Are you ready to leverage DevSecOps Get ready and use it for good Nicole Schwartz aka Circ DerbyCo
2022-05-07Enabling The Future Panel Dave Kennedy Jess Walpole Scott Angelo Kevin Baker DerbyCon 9



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering