What’s the difference between Def Con and Black Hat hacker conventions?

dvarian

Both hacker conventions are taking place at the same time in the same place, which seems a little odd to me. What’s the difference between the two?

Topic: Security
Answer this Question

Answers

2 total
landon
Vote Up (8)

I guess I would say that Black Hat is much more of a corporate, business oriented event. A lot of attendees are security professionals hawking their wares and glad-handing in the pursuit of more business. Def Con is closer to what most people would probably imagine a hacker event to be, more freewheeling and less corporate, with more emphasis on fun to boot.

Waldo
Vote Up (7)

Blackhat will cost you $2500 to attend in business casual attire.  Defcon will cost you $180 to attend in bluejeans and tshirts. You will enjoy yourself at Defcon much more than you will at Blackhat.

 

Ask a question

Join Now or Sign In to ask a question.
The attorney general of the U.S. state of Connecticut is concerned about the privacy implications of Apple Watch's handling of consumers' health information.
A banking trojan, known for its small size but powerful capabilities, has expanded the number of financial institutions it can collect data from, according to security vendor Avast.
It's not easy to figure out if your data has been collected by hackers, but an online tool has been expanded to hunt through one of the most prolific sources of leaked data, known as "pastes."
In the boardroom, when it comes to addressing the topic of security, there's tension on both sides of the table.
Miffed certificate authorities are calling on Google to give websites more time to upgrade the security used in browser-to-server communications before displaying warnings in Chrome.
What goes through the mind of a CSO/CISO upon being told by his or her team that their organization has been breached?
A security researcher has found that the malware used in the Home Depot and Target breaches are unrelated and cannot be used as an indicator that the same group is behind the attacks.
As VMware sells its network virtualization software, it's finding that security is a big driver for adoption.
Google fielded 19 percent more requests from the U.S. government for data on its users in the first half of this year compared to the second half of last year, the company said Monday.
What should happen to your personal digital communications -- emails, chats, photos and the like -- after you die? Should they be treated like physical letters for the purposes of a will?
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness