Hackers from around the globe are converging in the Nevada desert to celebrate DEF CON's 25th Anniversary. As I type this, tens of thousands of security-minded people of all stripes are in their cars or on planes converging upon sweltering Las Vegas to attend one of the world’s most famous hacker conferences, DEF CON. This year is a special one: it marks the 25th DEF CON and its silver anniversary.DEF CON (or DC) has grown to be a staggering event — last year’s attendance was somewhere over 20,000 attendees and I expect this year to eclipse that. It’s certainly come a long way from the first conference, where 100 or so like-minded hacker and security types met at the Sands to party in the desert. With DC’s continued success, I thought I would take some time to talk about why DC still matters, and what you can take from this year’s conference. About 15 or 20 years ago as a much younger man, I read magazine articles about DC and desperately wanted to go — stories of ballrooms filled of people who were interested and devoted to the world of hacking, research and security… all in one place. Reading stories about people who “spotted the fed” and were rewarded with a special t-shirt for their sleuthing, I remember being in awe of all the amazing names and groups like L0pht and Cult of the Dead Cow (CdC). I remember learning about CdC’s release of BackOrifice at DC 6 and being blown away by what it could do. Back then I was just getting started on my professional career in technology and could only dream of being able to travel to places like DC to meet these elite hackers.I’ve been attending DC for 8 or 9 years now, and even though it has grown to a staggering size, every year I take something new home with me. The opportunities for curious minds at DC to learn is unlike any other place in the world. The vendor village is always full of interesting gadgets, surplus hardware, hacker tools, books and other gems to experiment with. The workshops are free for attendees and you have the chance to learn from some of the most talented people in the hacker world on a multitude of subjects — some for the absolute beginner, some for the best of the best. The talks themselves touch every corner of the security world, and the practical village areas will teach you cool things like lockpicking, how to get started with Capture the Flag-type games, soldering small gadgets, and the basics of wireless hacking and auditing. There really is something for everyone, at every level of skill. If you’re interested in learning something new, then don’t hesitate to jump in head first, ask questions and experiment. I’ve found that the vast majority of people I’ve interacted with were thrilled to be able to share some of their knowledge with me. Beyond that though, DC is an incredible place to meet up with people you may have never met before, and only interacted with online. Researchers, enthusiasts, executives, journalists… and maybe even a “fed” or two. They all show up in the desert to celebrate the world of cybersecurity. If you’re a developer or working in product security for a tech or security vendor? Take some time to meet up with researchers you may have interacted with online. I can tell you that when you put a face to a name and sit down and have a beer or two and just talk about security, it really does build a better relationship in the future. At the end of the day, just about all of us are on the same side of the fence and just trying to keep people safe and deliver better products.This year I’ll be teaching a four-hour introductory workshop on the basics of radio scanning using Software Defined Radio hardware and software. I’m flattered to have been chosen to be able to give back and share some of my own knowledge to others. If you see me around, please say hello. Here’s to another 25 years of hacker fun in the desert. I hope you have a blast this week, meet new faces, and learn something new. Stay hydrated, stay curious, and wear comfortable shoes. I hope there will be cake! Related content opinion For endpoint security, trust but verify Your organization might eventually fall victim to a data breach but creating checks and balances to maintain a layered data security approach can help you come out the other side with fewer losses. By Richard Henderson Apr 11, 2018 6 mins Technology Industry Data and Information Security Endpoint Protection opinion GDPR keeping you up? There’s another monster hiding under the bed… There’s another deadline in May that needs to be paid attention to – the NIS Directive. By Richard Henderson Feb 01, 2018 4 mins Regulation Government Technology Industry opinion What to do about internet-connected toys? The allure of interactive, intelligent companions for our children is real, and perhaps unavoidable in the long term. It's best to tread lightly and slowly. By Richard Henderson Dec 21, 2017 3 mins Smart Home Consumer Electronics opinion The power of a single insider – lessons from Twitter A recent Twitter incident should be a great reminder for others on how one single person inside your organization can cause a significant incident with a lot of public exposure. By Richard Henderson Nov 03, 2017 3 mins Backup and Recovery Data and Information Security Social Networking Apps Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe