![]() Here’s my DEF CON badge from 2016 (on the right).Įach lanyard contains pieces of the puzzle for the crypto challenge. In fact, there is usually a contest around the badge creation, but there was no DEF CON 25 badge contest. While on occasion, these badges are just a badge, sometimes computers are embedded in the badge or some sort of puzzle is involved. ![]() One of the most intriguing items associated with the DEF CON culture is their event badge. I am thrilled to be going to DEF CON 25 – the twenty-fifth anniversary of DEF CON. Having attended DEF CON through the years, each year I look forward to learning about current and upcoming security activities and trends. While both conferences focus on computer security, Black Hat is for the “defenders” while DEFCON is geared towards the hackers who refer to themselves as “white hat” (non-malicious hackers). DEF CON vendors actually sell products associated with hacking. At DEF CON, there are far fewer corporate sponsorships than at Black Hat. The second security conference, DEF CON, is really quite different from the first one. Traditionally, training sessions about computer security are also offered at Black Hat. The first one, Black Hat, is primarily targeted at corporate audiences and sponsorships with well-known industry leaders and vendors supporting and attending the conference year after year. Two large annual security conferences are taking place in Las Vegas this week and I will be attending the second one. ![]() If you want to reach out to group leadership with questions or concerns, email ogden dc312 org.By Eric Watkins, Senior Malicious Detection Researcher at zvelo We do encourage you reach out to the other members of dc312 through the Member Resources section, either through Slack or another communication method. Who can I reach out to with more questions? While the term "hacker" is commonly used by media outlets to describe cyber criminals, members of dc312, as well as DEF CON itself, focus on utilizing their knowledge and experience for non-evil, be it for good or pure curiosity. Excursions and Outings - Whether finding a weekend to camp, heading afar to go skiing, or making a road trip to visit another city, random events of members commonly include other active members.ĭc312 does not condone, promote, or facilitate the commission of illegal acts.Frequently these occur both in person and online in video hangouts. Project Hackathons - For the more-active members of the 312, mini hackathons occur randomly to work on tackling projects together, whether open source, interesting research, or just for the fun of it.Many members work together on team challenges and competitions, grab food or drink together, or otherwise break through social awkwardness. Con Meetups - As many members travel to similar conferences together, these meetups focus on making the chaos of a conference become manageable.Not another Chicago Security Community Social Event, meetings focus on sharing knowledge, practicing skillsets, and collaborating on projects. dc312 Meetings - Commonly occurring on a monthly basis in the evening, Meetings are more formal and substantial.What/when/where/how are the dc312 Events?īringing people who live in, work in, or are traveling through Chicago, dc312 meetups occur in a variety of flavors and a variety of occasions. View more on how to get involved and stay in touch here. dc312 is heavily focused on participation, at all levels, and is not a purely social club. Show up to meetings, get involved remotely through chat, and join in on the conversation to be an ambassador of the 312 and larger DEF CON community. More info on DEF CON groups is available on the DEF CON website here. Knowledge ranges from decades of experience to just starting out with a passion. We're an informal grouping of hackers, defenders, and security sellouts who are in currently or formerly in the Chicago-land area. Dc312 is Chicago's local DEF CON group, focusing on learning new things, meeting new people, and working on technically interesting projects in ways that define the word "hacker".
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |