![]() There are some fantastic interviews by Dark Tangent and the other founders, which provide a rare behind-the-scenes context for how the con grew to be what it is today. The first Defcon was so successful, with the hundred hackers that went, that there's been a Defcon every year since.įor a complete history of the con, I highly recommend watching the full documentary embedded below, which is nearly two-hours long and goes into much greater detail than I could ever possibly do in this article. Why not invite everyone on #hack? Good idea! - Dark Tangent I decided what the hell, I'll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can't remember. I was just planning a party for a network that was shut down, except for my U.S. We talking about where we might hold it, when all of a sudden, he left early and disappeared. He was going to shut down the network when his dad took a new job and had to move away. plan a closing party for all the member BBS systems and their users. hub, I was helping the Platinum Net organizer. meant to be a party for member of "Platinum Net", a Fido protocol based hacking network out of Canada. If you only know the name Defcon (sometimes stylized as DEF CON or DEFCON) with nothing but a vague notion that it's a hacker conference, then you should know that it was started in 1993 by Dark Tangent (aka Jeff Moss). With that in mind, I'm writing this article to help those new attendees or noobs have a fun and exciting experience. ![]() The con is the combination of some of the most brilliant minds in the industry, some of the most annoying pranksters, and a few well-meaning drunks. ![]() So for those who are unaware, the networks are hostile, and the Wall of Sheep is real. This makes Defcon one of the best places for hackers to go and meet like-minded individuals. Most, however, are fellow hackers and tech nerds just like you. Sometimes they are sent by employers, some are reporters hoping to get the latest scoop, and a handful are just curious tourists and happen to be in Vegas at the time. Not all of those people attending will be familiar with the security industry and culture. No single hotel is large enough to hold all the hackers that descend on Las Vegas every July/August. Thousands of new people attend Defcon every year, and Defcon 25 was said to have 25,000 attendees, forcing it to expand to two venues. In this guide, we'll take a holistic view at everything that goes into attending the con for the first time, from securing your electronics and making the most of your time to the logistics of getting there and finding the right place to stay. Jen gave one of the best keynotes I’ve seen in a while and I am excited for what she will be able to accomplish at CISA.Defcon is the largest hacker conference with something for everyone, whether it be the talks, parties, villages, or any of the hundreds of events. government played a prominent role with the new director of CISA, Jen Easterly, providing one of the keynotes and announcing a new collaboration with the private sector ( Joint Cyber Defense Collaborative – JCDC). Ransomware is still a critical topic and while cybersecurity plays a role in countering ransomware, there was consistent discussion around resilience and recovery (ability to restore from back-ups quickly). A good reflection of this interest manifesting in the market is the recent valuation of Interos at $1b. There is a lot of interest in supply chain management solutions, which is especially driven by the recent executive order creating requirements around supply chain and software integrity for companies selling to the USG. Def Con had announced a mask requirement regardless of local mandates.Īt Black Hat, supply chain was key thematic, with organizations still feeling the effects of the SolarWinds breach. Las Vegas had an indoor mask mandate in place which also reduced the ambiguity for Black Hat attendees. ![]() This is likely a solid indicator that in-person events are possible with appropriate controls in place. Only 25 people were turned away for lack of adequate documentation. Def Con required proof of vaccination and manually processed 10k people to verify vaccination status. Here are a few informal observations for those interested:Įach event had about 10k participants which represented about 1/3 of normal in-person attendance. The OODA presence at Black Hat and Def Con conferences was greatly reduced, in-line with a smaller event overall. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |