Sacha Faust, Scaling Red Team, Ops Track

Subscribers:
6,000
Published on ● Video Link: https://www.youtube.com/watch?v=kfzJ0MUGL-g



Duration: 28:51
4 views
0


ACoD hacking Conference 2017




Other Videos By All Hacking Cons


2021-10-07Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track
2021-10-07Art Manion, Desperately Seeking Severity
2021-10-07Alex Pinto, Beyond Matching Applying Data Science Techniques to IOC based Detection, Ops Track
2021-10-07Alban Diquet, TrustKit A defensive library to protect communication on mobile apps, Ops Track
2021-10-07Aaron Shelmire, Decreasing Dwell Time, Ops Track
2021-10-07John Althouse, Detection Bro, Ops Track
2021-10-07Joel Wilbanks and Steve Orrin, Adding Discipline to Information
2021-10-07Joe Stewart feat Inbar Raz, Researcher Conferences Suck
2021-10-07Jesse Trucks, Future proof the InfoSec Arms Race
2021-10-07Jared Smith, Effective Forensic Analysis and Incident Response with Volatility, Ops Track
2021-10-07Sacha Faust, Scaling Red Team, Ops Track
2021-10-07Zac Brown, Hidden Treasure Detecting Intrusions with ETW, Ops Track
2021-10-07Sounil Yu, How I Learned to Stop Information Sharing and Love the DIKW, Ops Track
2021-10-07Sam Wilson, Logging the next trillion events, Ops Track
2021-10-07Chris Sanders, A Cognitive Psychology Approach of Security Investigations, Ops Track
2021-10-07Carlos Sanchez, Apache Spot, Opa Track
2021-10-07Bryan Zimmer, Location Independent Security Approach LISA, Ops Track
2021-10-07Alex Pinto, Beyond Matching Applying Data Science Techniques to IOC based Detection, Ops Track
2021-10-07Alban Diquet, TrustKit A defensive library to protect communication on mobile apps, Ops Track
2021-10-07Aaron Shelmire, Decreasing Dwell Time, Ops Track
2021-10-07Rich Mogull, Building the Easy Button Five ish Ways to Radically Automate SecOps, Ops track



Tags:
hacking
conference
hacker
old school
hacking conference
defcon
infosec
opsec
IT
information technology
information security
dybersecurity
ethicalhacking
pentesting
tech
cyber
cybercrime
malware
hacks
datasecurity
software
android
iphone
ios
iot
programming
coding