Open A dynamic platform for security professionals to connect, collaborate and grow. Attend the next edition
Community & Social Impact

Hacker's Assembly

A distinguished multi-city gathering organised by Secure Purple, bringing together ethical hackers, cybersecurity researchers and industry experts. Hacker's Assembly is a dynamic platform where individuals connect, collaborate and grow in the field of cybersecurity, regardless of seniority.

Hacker's Assembly is one of the most distinguished and anticipated events hosted by Secure Purple: a recurring, multi-city gathering that brings together ethical hackers, cybersecurity enthusiasts, and industry professionals from across the country and beyond.

It is deliberately not a traditional conference. There is no keynote parade, no paywall and no hierarchy of badges. What the Assembly offers instead is a room where a government cybersecurity official, a senior malware analyst, a first-year student and an independent bug bounty hunter can sit at the same table and trade notes on the same threat.

The philosophy is simple: no one becomes a master in anything overnight. The Assembly exists to create the conditions where mastery compounds faster, through discussions, hands-on activities, real-world case studies and the mentorship that naturally happens when the right people are in the right room. It is a movement that brings hackers together, and the community it has built is its most durable output.

"Hacker Assembly is more than just an event. It's a movement that brings hackers together. You walk in alone, you walk out with collaborators."

Secure Purple Community Team
Three Core Themes

What Hacker's Assembly Is Built On

Every edition is designed around three principles the community returns for: the ones that turn attendance into career momentum.

Learning & Perseverance

Nobody becomes a master in anything overnight. The Assembly promotes continuous skill development, hands-on experimentation and the kind of patient, iterative work that real security research demands.

Networking & Careers

Direct access to industry leaders, government representatives and hiring managers. Many attendees land their first bug bounty collaborators, first job or first mentor at an Assembly.

Community Building

A supportive environment where professionals at every level share experiences, setbacks and discoveries, making the field less intimidating for newcomers and less isolating for veterans.

Who Attends

The Room Is Deliberately Mixed

The Assembly is intentionally cross-functional. This is where senior researchers, government representatives and first-year students meet over the same table.

  • 01
    Ethical hackers & bug bounty hunters Independent researchers and platform-ranked hunters
  • 02
    Malware analysts & developers Reverse engineers, tooling authors, detection engineers
  • 03
    Government officials National cybersecurity, policy and regulatory representatives
  • 04
    Information security experts Consultants, CISOs, security architects and auditors
  • 05
    Aspiring cybersecurity professionals Students, career-changers and self-taught learners
  • 06
    Industry leaders Founders, heads of security and senior technical leadership
Programme

Inside A Typical Edition

  1. 01

    Opening Discussion

    Framed conversation on an emerging threat, research trend or policy topic, seeded by a researcher or operator from the field.

  2. 02

    Hands-on Activity

    Group challenge or live-demo session: CTF-style puzzles, tool walkthroughs or collaborative triage on a real-world case.

  3. 03

    Case Studies

    Attendees share real-world incidents, disclosures, successful hunts and, importantly, failures and what they learned.

  4. 04

    Networking

    Open floor for mentor matching, hiring conversations and cross-team collaborations that continue long after the event.

Common Questions

Everything You Might Want To Ask

For attendees, hosts and first-time participants wondering what to expect.

Is there a cost to attend?

No. The Assembly is free to attend and community-funded. Hosting partners and sponsors cover venue and logistics so that no attendee ever has to pay to be in the room.

Do I need cybersecurity experience to participate?

Not at all. The Assembly is explicitly cross-seniority. Students, career-changers and self-taught learners attend the same editions as veteran researchers and industry leaders, and that mix is the point.

How often do editions happen?

Editions recur across multiple cities. Cadence is announced ahead of each run on the Secure Purple channels. Hosting partners in new cities can reach out to propose bringing an edition to their region.

Can I speak or run a session?

Yes. Sessions come from the community. If you have original research, a recent disclosure, a tool walkthrough or a case study to share, email ask@securepurple.com with a short abstract.

What types of cyber threats are typically discussed?

Editions have covered malware analysis, ransomware operator tradecraft, phishing infrastructure, large-scale data breaches, insider threats, cloud misconfiguration and the operational reality of incident response. Discussion is threat-led, not vendor-led.

Is there a code of conduct?

Yes. The Assembly runs under a clear code of conduct centred on respect, inclusion and responsible disclosure norms. Anti-harassment standards are enforced. Reports go directly to the organising team.

Do you record or publish the sessions?

By default, sessions are not recorded. That is part of why attendees are willing to share sensitive research openly. Specific sessions may be recorded with all speakers' consent and published later via Be Internet Secure.

How do companies get involved?

Companies can sponsor editions, contribute mentors from their security teams, or host an edition at their venue. Email ask@securepurple.com with "Hacker's Assembly" in the subject line.

Practitioner voices

What the room sounds like.

Research presented here would hold up at any international con. The talks aren't watered down for the room; the room is ready for them.
Danish Tariq Black Hat Speaker

Join The Next Assembly
Or Host An Edition In Your City.