Silicon Shecky

Infosec Practitioner

  • About
  • Categories
    • General
    • Computers
    • Software
    • Rants
    • Security
    • Internet/Music
    • Reviews
    • Microsoft
    • Hardware
    • Mobile Computing
  • Links
    • Infosec
      • Burbsec
      • Infosec Exchange Mastodon
      • Hacks4Pancakes Blog
      • Krebs On Security
      • Bleeping Computer
  • Archives

Connect

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter

[footer_backtotop]

Copyright © 2025 ·Sixteen Nine Pro Theme · Genesis Framework by StudioPress · WordPress

Post Derbycon Wrapup

October 12, 2018 By Michael Kavka Leave a Comment

I went to my first Derbycon last weekend, and what a time it was. Yes Lobbycon is pretty cool. Yes the entertainment was a blast. The talks were all top rate (after seeing them, I am glad I my talk got turned down). I recommend checking out Derbycon if you can, and even if you do not have a ticket, go anyway. There winds up being last minute tickets available if you watch the Slack channel for Derby.

The fun for me with a con though, is finding things I can start working on in the environment I have. Derby had a great talk by Michael Gough on WMI Detection, that I am going over again so I can implement some of it. Actionable items like these are fantastic, and with certain things going on right now, should be rather helpful.

The name of the game on anything though is what impact good and bad will such things have on one’s environment. The second question is about the maturity level of your environment, not just technology wise, but resource wise. If you do not have the resources to maintain things, then you cannot do them, no matter how automated it might be. Otherwise all you have done is set up a system that won’t get used and has the potential to be a security hole as it is not maintained.

There are tons of great ideas, theories and thoughts out there, and more pop up every day. Just make sure you are not overspreading yourself.

Filed Under: Reviews, Security Tagged With: Derbycon, Michael Gough

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

RSS Taggart Institute Intel Feed

  • Cybersecurity Reading List - Week of 2025-10-27 October 27, 2025 Ian Campbell
  • US declines to join more than 70 countries in signing UN cybercrime treaty October 27, 2025
  • Google disputes false claims of massive Gmail data breach October 27, 2025 Lawrence Abrams
  • Attackers bypass patch in deprecated Windows Server update tool October 27, 2025 Matt Kapko
  • Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild October 27, 2025 Unit 42
  • X: Re-enroll 2FA security keys by November 10 or get locked out October 27, 2025 Lawrence Abrams
  • Ransomware profits drop as victims stop paying hackers October 27, 2025 Bill Toulas
  • Sweden’s power grid operator confirms data breach claimed by ransomware gang October 27, 2025
  • 'House of Dynamite' Is About the Zoom Call that Ends the World October 27, 2025 Matthew Gault
  • Windows will soon prompt for memory scans after BSOD crashes October 27, 2025 Sergiu Gatlan

Browse by tags

Active Directory Android Antivirus Apple Beta Chrome Computers Exchange Exchange 2007 Firefox General Thoughts Google InfoSec Internet Explorer iOS iPad IT Linux Mac Malware Microsoft OS OSx Patches Rants SBS SBS 2008 Security Security Patches Server SMB Software Support Surface TechEd Tweets Ubuntu Verizon Virus Vista vulnerabilities Windows Windows 7 Windows 8 XP