What is CYPHERCON?

CYPHERCON is an Information Security and cryptography oriented hacker conference based in the state of Wisconsin.

When and where is CYPHERCON 2018?

April 12/13, 2018 at the Wisconsin Convention Center in Milwaukee, Wisconsin

What other important dates should I know?

January 10, 2018 – Speakers noftified/announced
February 29, 2018 – hotel group rates ends
April 12/13, 2018 – Event Begins!!

Why does CYPHERCON Exist?

The event aims to lead, convene, and connect information security friends for a free and open discussion on strong cryptography, become advocacy outlet for privacy, and strive for the betterment of education of the general public in a diligent, loyal, honest manner, and not knowingly be part of any illegal or improper activities. We will accomplish this by being the interchange of knowledge and ideas, advancing the industry forward, while never forgetting our cultural hacker past.

What is there to do at CYPHERCON?

The conference format allows for talks, informal discussions, socializing, challenges, contests, and competitions. Technology and hacking is the primary purpose of the con. Some like hacking the badge, some like capture the flag, some like the presentation topics.

What are the ticket types?

2018 will have 3 types of tickets: A digital ticket that includes a electronic badge, an analog ticket that includes a paper badge at reduced cost, and a speaker badge… for speakers!

Are CypherCon tickets transferable?

Yes, Each ticket is a QR code that grants one entry. You may contact us to verify.

What are the Talks like?

Presentations include: corporate and network security, privacy, personal rights and freedoms, new technologies, modern exploit techniques, security philosophy, hardware hacking, forensics, reverse engineering, protocol analysis, cryptographic algorithms, and all-around security issues with comedic ‘hacker’ motifs. Lastly, you never really have to touch a computer, and can socialize.

What is the IRC channel for CypherCon?

Freenode #Cyphercon – easy access web chat: https://webchat.freenode.net then #cyphercon

I’m not a hacker, should I go to CYPHERCON?

Anyone in good standing may attend! A hacker is someone who is curious and creative, and seeks to understand how things work. Ultimately, many people have different characterizations of what a ‘hacker’ is, you can express whomever you wish to be. Come learn with us, see interesting things, and participate!

What is the age limit?

CYPHERCON has no age limit, but we don’t at present have specific areas designed for children on Thursday or Friday. Saturday will indeed have Hak4kidz a parent/child event.

Do you offer cancellation refunds?

No, but we will help you find a good hacker or student to attend. A good cause =)

Do sponsors influence the event?

To guarantee the independent nature of the conference, CYPHERCON has the following sponsorship guidelines:

    • Sponsors cannot affect the agenda
    • Sponsorship will not guarantee (nor prevent) a presentation slot
    • Zero tolerance for presentations that focus on marketing or directly promoting a commercial product

Is there a code of conduct?

Yes:

CypherCon provides a forum for open discussion between participants, where radical viewpoints are welcome and a high degree of skepticism is expected. However, insulting or harassing other participants is unacceptable. We want CypherCon to be a safe and productive environment for everyone. It’s not about what you look like but what’s in your mind and how you present yourself that counts at CypherCon

We do not condone harassment against any participant, for any reason. Harassment includes deliberate intimidation and targeting individuals in a manner that makes them feel uncomfortable, unwelcome, or afraid.

Participants asked to stop any harassing behavior are expected to comply immediately. We reserve the right to respond to harassment in the manner we deem appropriate, including but not limited to expulsion without refund and referral to the relevant authorities.

This Code of Conduct applies to everyone participating at CypherCon – from attendees and exhibitors to speakers, press, volunteers, and staff.

Anyone can report harassment. If you are being harassed, notice that someone else is being harassed, or have any other concerns, you can contact a staff member, go to the registration desk, or info booth.

Conference staff will be happy to help participants contact hotel security, local law enforcement, or otherwise assist those experiencing harassment to feel safe for the duration of CypherCon

Remember: The CON is what you make of it, and as a community we can create a great experience for everyone.

*Thank you to DEFCON for the open source code of conduct and their legal team’s time and effort.

What is the Photography Policy?

Media Rights and Responsibilities

CYPHERCON is a private event. As a participant or member of the media, you must be aware of your rights and responsibilities. CYPHERCON is committed to preserving the uniquely creative and private character of its culture. Hackers tend to be passionate about personal privacy and we respect that. To that end, we ask all participants, including members of the media, to exercise and respect certain rights and responsibilities.

Photography/video without explicit permission is forbidden, with the exception of approved “Media Professionals”

If you wish to use any photo, video, or audio from the event for any use, you must apply and receive a “Media Professional” status for the CYPHERCON event. We offer two types: personal photographer status and a commerical “non-personal” media status. Both require this registration process to protect the privacy and other rights of participants and to prevent commercial exploitation of CYPHERCON.

“Personal Media Status” includes:

Obtain consent of all in the frame.

Content reviewed by CYPHERCON leadership prior to approval

“Commercial Media Status” include:

Publishing photos in a printed or online book, magazine, or newspaper.

Using footage in a professional quality video.

Displaying images on a non-personal website or in a gallery show.

Using imagery in a documentary or TV show.

Distributing media to any third-party group or publication. This includes offering photos for publication, or making any commercial or promotional use of event media.

General rule of thumb for whether a use is non-personal: Is the event imagery being used for financial gain, OR being widely distributed beyond your personal network of friends and family? If either of these is true, you are likely commercial.

To apply for a personal photographer status and a commerical “non-personal” media status, please apply as “Media Professional” by contacting Goetzman@gmail.com with the following information:

Full Name & Title:

Personal or commercial Status:

Publication:

Link to articles you’ve written pertaining to computer security/hacking or other Defcon related topic (if new to security, send best articles on a different subject):

Phone number (cell):

Email address:

Failure to abide by these rules may result in the revocation of your press pass, ejection from the property, and/or legal consequences.

If your image violates the privacy or other rights of another participant, you should not display it in any public manner. If you did not pre-register as a professional shooter at the event, you may apply for permission later if you or someone else wishes to make non-personal use of your images. But you must obtain our written permission before the use is made.

Where should I stay the night?

We recommend stating at the Hilton or Hyatt hotel connected to the conference. If those are unavailable we recommend the historic hotel downtown Milwaukee called The Pfister Hotel.