Announcement
Collapse
No announcement yet.
Calendar
Collapse
Initializing Tabs & loading Content...

Loading Calendar...

Upcoming Events
Collapse
-
Apr 3000:00 | The DEF CON 29 Call for Parties and Meetups deadline is April 30th.
-
Apr 3001:00 | Our friends at the Order of the Overflow (@oooverflow) have announced the date and time of the DC29 CTF qualifier - April 30, for 48 hours! Prepare accordingly.
Download .ical file:... -
May 100:00 | May 1 is the Deadline for Call for Papers submissions
-
May 100:00 | The DEF CON 29 Call for Workshops deadline is May 1st.
-
May 100:00 | The DEF CON 29 Press Registration Deadline is May 1st.
-
May 101:00 | The DEF CON 29 Call for Trainers deadline is May 1st.
-
May 1200:00 | The Deadline for DEF CON 29 Call for Demo Labs is May 12th.
-
Jun 100:00 | The DEF CON 29 Call for Music and Soundtrack entries deadline is June 1st.
-
Jun 100:00 | The DEF CON 29 Vendor Application deadline is June 1st
-
Aug 501:00 |
DEF CON 29 will be August 5 to 8, 2021
Announcements and Questions in this thread as we build out all the specific sub forums.... -
Aug 501:00 |
Growing from seeds of demand, the Biohacking Village emerged at DEF CON to deliver action-oriented reinvention of the safety and security of health care. THE BIOHACKING VILLAGE, a 501(c)3 organization, is uniquely poised to inform global conversations in health... -
Aug 501:00 |
Ham radio isn’t just what your grandpa does in the shed out back. Radios are an important piece of technology we use everyday, and amateur (“ham”) radio has been at the forefront of its development since day one -- we are some of the original hardware... -
Aug 601:00 |Be the Match Bone Marrow Donor registration drive
With one swab, we can determine if your bone marrow can save a patient's life. Take The First Step To Being Someone's Cure. Become A Marrow Donor Today! Only Takes 10 Minutes.... -
Aug 6
-
Aug 601:00 |
DEF CON’s Next Top Threat Model(Formerly Threat Modeling Challenge from DC27)
Threat Modeling is arguably the single most important activity in an application security program and if performed early can identify a wide range of potential flaws before a single line of code... - Loading...
- No more items.