Follow THE Yellow Brick Code + CPEs

Why Attend?

This highly technical forum showcases eye-opening presentations from world-renown ethical hackers and epic security practitioners that will leave you amazed and frightened at the same time. By pulling back the curtain and giving you access into the mind of a hacker, you will better understand how to protect your networks and critical data.

In addition to witnessing real-world hacks, experts will tackle a variety of specialized topics as you discover the latest vulnerabilities, the most powerful exploits and current security threats at this one-day, cutting-edge con.

Whether you’re a large corporation or a small business, you should attend this mind-blowing event as you witness the cream of the crop unveil the latest attacks, techniques, tactics and practices of today’s hackers. Plus, gain insight and understanding into ways to effectively protect yourself so you can implement this information immediately when you return to your organization.

Who Should Attend

Any and every one from professionals to industry influencers to decision-makers such as:

  • System Admins
  • Database Administrators
  • Software Developers
  • IT Executives, Directors & Managers
  • Security Professionals
  • C-Level Executives (CTO, CIO, CEO, CISO, CSO)
  • Presidents, VPs, Business Owners
  • Plus, Other Related Professional Roles

All industry verticals welcome including: government, finance, health care, utility, professional services, education, retail, nonprofit and more.

Can Students Attend?

Those enrolled in a technical school, college or university currently pursuing a career path in Information Security / Cybersecurity are welcome. However, you must be 18+ years of age and are NOT permitted to attend the happy hour reception unless you are 21 years of age or older. Contact us for more information + pricing. Must have .edu or similar email domain. Student pricing does not apply to professionals enrolled in continuing education courses.

Master Security Issues

Whether you’re enterprise or SMB, OzCon is built for the people who build, break, defend, and decide. Come see the best in the field reveal current attacks, techniques, and counter-moves—then leave with steps you can implement immediately.

ROLES

  • System Administrators, SOC / IR Analysts
  • Cloud & Identity Engineers/Architects, AppSec
  • Database Administrators, Software Developers
  • Security Professionals & Engineers
  • IT Leaders: Managers, Directors, VPs
  • Executives: CISO, CIO, CTO, CEO, CSO, Presidents & Owners
  • Plus related technical and business roles

INDUSTRIES (All Welcome!)

• Financial Services
• Healthcare
• Utilities
• Professional Services
• Education
• Retail
• Nonprofit
• Manufacturing
• Media/Tech
• and more

(Red, Blue, Purple—oh my! One room. Shared reality. Practical takeaways.)