By proceeding, you agree to our Terms of Use and Privacy Policy.
CypherCon is an annual hacker conference based in Milwaukee, Wisconsin. We enjoy puzzles, mystery, and discovery. We pride ourselves with a unique culture that focuses heavily on retro-futuristic 70s,80s,90s,00s hacker culture blending the art of dancing between fantasy and reality. Our core event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions. In addition we publish puzzles made by the community in unique story worlds. Lastly, we offer a blank canvas for hacker specializations ran by volunteers called villages. Presentations topics include Cyphers, Hacking, Information Security, Cryptography, Forensics, and other hacker, cypherpunk, and cyberpunk oriented topics. We also offer presentations for career development, security leadership, and risk. Our 2019 event had 1000 attendees. We cancelled 2020 & 2021 due to the pandemic. Our 2022 event returned with over 1100 attendees. Our next scheduled event is CypherCon 6 on March 30-31, 2023.
Learn, sharpen your skills and get hands-on experience with the latest tech.
Dive into the new era of digital transformation & explore topics such as encryption, social engineering, malware analysis, and more.
Expand your network & connect with peers to exchange ideas, experiences and insights. Partake in a wide range of talks, workshops & training sessions.
Gain expert insights, tools, techniques, and strategies for securing networks, systems, and data to take your skills and knowledge to the next level.
CypherCon is Wisconsin’s Hacker Conference! Our conference provides hackers with an outlet to openly demonstrate and experience creativity and ingenuity through hands-on enlightening activities and thought provoking presentations and technical projects.
At Elastic, we help organizations, their employees, and their customers accelerate the results that matter.With solutions in Enterprise Search, Observability, and Security, we help enhance customer and employee search experiences,
At Elastic, we help organizations, their employees, and their customers accelerate the results that matter.With solutions in Enterprise Search, Observability, and Security, we help enhance customer and employee search experiences, keep mission-critical applications running smooth
Fortinet makes possible a digital world that we can always trust through its mission to protect people, devices, and data everywhere.
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.
Tanium gives the world’s largest enterprises and government organizations the unique power to secure, control, and manage millions of endpoints across the enterprise within seconds.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally.
Cisco enables people to make powerful connections--whether in business, education, philanthropy, or creativity.
SentinelOne was founded in 2013 by an elite team of cybersecurity and defense experts who developed a fundamentally new, groundbreaking approach to endpoint protection.
A global association of 140,000 professionals in 180 countries, ISACA® (www.isaca.org) helps business and IT leaders maximize value and manage risk related to information and technology.
CrowdStrike, a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.
Secureworks® (NASDAQ: SCWX), a global cybersecurity leader, enables customers and partners to outpace and outmaneuver adversaries with more precision, so they can rapidly adapt and respond to market forces to meet their business needs.
"Cobalt’s Pentest as a Service (PtaaS) platform is modernizing traditional pentesting. By combining a SaaS platform with an exclusive community of testers, we deliver the real-time insights you need to remediate risk quickly and innovate securely.
From the Acropolis to the edge of space, defenders have sought the high ground in order to see farther and turn back attacks. Corelight delivers a commanding view of your network so you can outsmart and outlast adversaries.
Red Canary was founded to make security better. We defend hundreds of organizations around the world, with customers ranging from global Fortune 100s to 100-endpoint organizations.
Halcyon is a cybersecurity company building products that stop ransomware from impacting enterprise customers.
Northwestern Mutual is here for what’s most important—helping families and businesses achieve financial security for over 160 years.
Sprocket Security was founded to improve the way we approach cybersecurity. Currently the industry performs services in a timeboxed, or point-in-time approach. We think this is fundamentally flawed.
PKWARE offers the only data discovery and protection solution that locates and secures sensitive data to minimize organizational risks and costs, regardless of device or environment.
TrustedSec is an information security consulting team at the forefront of attack simulations with a focus on strategic risk-management.
We are WordPress VIP, the agile content platform leading a powerful enterprise ecosystem. As we fit seamlessly across your organization, enjoy the ease, flexibility, and freedom you need to scale...
runZero formerly Rumble Network Discovery provides an asset inventory and network visibility solution that helps organizations find and identify managed and unmanaged assets connected to their networks and in the cloud.
White Knight Labs is a cyber security consultancy that specializes in offensive cyber engagements. We are a small band of engineers that work intimately with our clients to develop risk-based approaches to improve the overall security of their busine
White Knight Labs is a cyber security consultancy that specializes in offensive cyber engagements. We are a small band of engineers that work intimately with our clients to develop risk-based approaches to improve the overall security of their business.
All trademarks, registered trademarks, product names, and company names or logos mentioned in or on this site are the property of their respective owners.
A great community. Legit content. The kind of emails you actually look forward to.