• Watch
  • Listen
  • Live Stream
Security Weekly
Security Market Validation
  • Listeners
    • Subscribe
    • Insider List
    • Suggest a Guest
  • Shows
    • Paul’s Security Weekly
    • Enterprise Security Weekly
    • Business Security Weekly
    • Application Security Weekly
    • Security & Compliance Weekly
    • Security Weekly News
    • Tradecraft Security Weekly
    • Secure Digital Life
  • Series
    • CISO Stories
    • Getting the Real Work Done in Cybersecurity
  • Webcasts/Trainings
    • Registration
    • On-demand
  • Articles
  • Partners
    • Become a Partner
    • Landing Pages
  • Hosts
  • Company
    • About
    • Careers
    • Contact

Articles

The Security Weekly/i-Hacked DEFCON Party

Larry Pesce July 9, 2009

The planning for the party is shaping up, but in traditional Security Weekly fashion, a lot of the details are coming in at the last minute.
We’ll have some totally rockin’ DJs from DJ Great Scott’s crew (when when have confirmation, we’ll let you know exactly who). We’ll have adult beverages – we’re looking at an open tab for a certain dollar amount, and when the free drinks are gone, cash bar will be available.
We’re also exploring some awesome (and geeky) visual displays as well. These are guaranteed to be all sorts of fun. All I’m saying: super schweet lasers.
You know you want in. You’ll need one of these:

party_badge.jpg

Yes, part of the badge has been intentionally obscured.
Also, the i-Hacked guys will also have their own sets of badges to give out that look different (and are awesome). How they give theirs out are their call.
So, how do you get a Security Weekly badge? The rules are pretty clear:

  1. Hot strippers of the female variety are awesome. Hot female midget strippers are also awesome. Just sayin’.
  2. Bribery. See #1.
  3. Come find us at our booth in the vendor area and tell us why you need to be there. This will take some convincing, so try hard. See #1 and #2.
  4. Come find us at our booth in the vendor area and show us the “picture that pays”. Electronic or printed copies are OK, but you need to show it to us – no thumb drives, urls, etc. This is very simple puzzle and everything that you need to find the clues is in this blog post.

Come find us early. When the passes are gone, they are gone.
See you at DEFCON.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related Posts

uptrend line arrows with bar chart in stock market on blue color background

Articles /

Ransomware Damage Claims Driving Insurance Hikes

web-application-firewall-comparison-696x423

Articles /

Building a More Secure AppDev Process

apptitude-test

Articles /

Diversifying Cybersecurity Talent Through Aptitude Testing

‹ How To: Sniffing DECT Wireless Devices › Exploiting MSVidCtl ActiveX with Metasploit

About Security Weekly

Security Weekly is the security podcast network for the security community, distributing free podcasts and media since 2005. We connect the security industry and the security community through our security market validation programs.

More Than Just A Sponsor

We view our relationships with the security industry as partnerships, not sponsorships. Security Weekly works closely with each partner to help you achieve your marketing goals and gain traction in the security market. Interested in becoming a partner? Please visit our partnerships page.

Back to Top

Subscribe To The Blog:

RSS feed RSS - Posts

Search

Latest Tweets

Tweets by @secweekly
© Security Weekly 2022
Powered by WordPress • Themify WordPress Themes