You might be a security professional who could not get time off for DefCon. Perhaps you could not justify it to your manager (who is probably a DefCon veteran). Or you just didn’t know what it was all about. I will be your guide into the DefCon world. So sit back, get comfy – we’re reading, we’re reading….DefCon 17 is a raid to the senses, especially for the first-timer. July 30, 2009 kicked off the fevered exploration of all things technology and security. It may be obvious to the initiated that DefCon is not BlackHat, but this statement does not fully convey to magnitude of these difference. BlackHat is the polished face that information security professional express to their business customers. DefCon is the raw, savage expression of the passion these professionals bring to their work.PresentationsDefCon, like BlackHat, hosts presentations offered by information security researchers and luminaries. DefCon stands out because it also attracts the security “outlaws” – those intrepid “hackers” who exploit the fundamentals of technology. Small break-out sessions allow for more intense discussions around granular topics. These dialogues are sometimes controversial, but they are critical in stimulating attendee dialogue. Capture the FlagIf you did not image your only laptop before entering this competition, you should reconsider participating. This exercise puts your knowledge of system exploits to the test in a competitive environment where your performance is displayed on a wall monitor for all to see. Most Capture the Flag events outside of DefCon adhere to a code of honor – don’t hack your opponent. Don’t assume that this code is shared among the cyber gladiators you will challenge. VillagesIf you’ve ever want to learn how to pick a lock or solder components to a circuit board, DefCon villages are the place to be. This is a must for the people who wish to enhance the functionality of their convention badge. I had the pleasure of contributing my press badge to a project where the different badges where arranged into a circle that flashed in sequential patterns of light. I will post pictures in an upcoming installment. These villages extend individual security awareness by highlighting the role that various components play in a system.EntertainmentNo convention is complete without festivities to offset information overload. If you want to get an insight into the hacking subculture, a DefCon party is required field work. The parties range from mild meet-ups in hotel rooms/bars to bacchanalian balls that redefine your party archetype. Regardless of your comfort zone, I recommend party attendance highly. If nothing else, they are great labs in which to practice social engineering.Stayed tuned for the next installment to this series. I will include some cool pictures and stories from DefCon. Related content opinion Positioning the Security Team Through Influence Part 1 Influence styles are a reflection of the influencers and, by extension, their team. Thus, they must understand the situations to which different styles are applicable. This series explores the common influence styles and their application. By Steven Fox Apr 21, 2012 3 mins Technology Industry IT Jobs opinion From Obstacle to Ally - Repositioning the Security Team Pt 1 By Steven Fox Apr 08, 2012 3 mins Technology Industry IT Strategy opinion Key Sessions at CISO Executive Summit 2011 By Steven Fox Dec 03, 2011 3 mins Business Continuity Data and Information Security Careers opinion Securing User Credentials On Mobile Devices By Steven Fox Nov 15, 2011 4 mins Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe