Learning & Perseverance
Nobody becomes a master in anything overnight. The Assembly promotes continuous skill development, hands-on experimentation and the kind of patient, iterative work that real security research demands.
A distinguished multi-city gathering organised by Secure Purple, bringing together ethical hackers, cybersecurity researchers and industry experts. Hacker's Assembly is a dynamic platform where individuals connect, collaborate and grow in the field of cybersecurity, regardless of seniority.
Hacker's Assembly is one of the most distinguished and anticipated events hosted by Secure Purple: a recurring, multi-city gathering that brings together ethical hackers, cybersecurity enthusiasts, and industry professionals from across the country and beyond.
It is deliberately not a traditional conference. There is no keynote parade, no paywall and no hierarchy of badges. What the Assembly offers instead is a room where a government cybersecurity official, a senior malware analyst, a first-year student and an independent bug bounty hunter can sit at the same table and trade notes on the same threat.
The philosophy is simple: no one becomes a master in anything overnight. The Assembly exists to create the conditions where mastery compounds faster, through discussions, hands-on activities, real-world case studies and the mentorship that naturally happens when the right people are in the right room. It is a movement that brings hackers together, and the community it has built is its most durable output.
"Hacker Assembly is more than just an event. It's a movement that brings hackers together. You walk in alone, you walk out with collaborators."
Secure Purple Community TeamEvery edition is designed around three principles the community returns for: the ones that turn attendance into career momentum.
Nobody becomes a master in anything overnight. The Assembly promotes continuous skill development, hands-on experimentation and the kind of patient, iterative work that real security research demands.
Direct access to industry leaders, government representatives and hiring managers. Many attendees land their first bug bounty collaborators, first job or first mentor at an Assembly.
A supportive environment where professionals at every level share experiences, setbacks and discoveries, making the field less intimidating for newcomers and less isolating for veterans.
The Assembly is intentionally cross-functional. This is where senior researchers, government representatives and first-year students meet over the same table.
Framed conversation on an emerging threat, research trend or policy topic, seeded by a researcher or operator from the field.
Group challenge or live-demo session: CTF-style puzzles, tool walkthroughs or collaborative triage on a real-world case.
Attendees share real-world incidents, disclosures, successful hunts and, importantly, failures and what they learned.
Open floor for mentor matching, hiring conversations and cross-team collaborations that continue long after the event.
Across cities and editions: speakers, researchers, government officials and the next generation of ethical hackers, in the rooms where the Assembly happens.
For attendees, hosts and first-time participants wondering what to expect.
No. The Assembly is free to attend and community-funded. Hosting partners and sponsors cover venue and logistics so that no attendee ever has to pay to be in the room.
Not at all. The Assembly is explicitly cross-seniority. Students, career-changers and self-taught learners attend the same editions as veteran researchers and industry leaders, and that mix is the point.
Editions recur across multiple cities. Cadence is announced ahead of each run on the Secure Purple channels. Hosting partners in new cities can reach out to propose bringing an edition to their region.
Yes. Sessions come from the community. If you have original research, a recent disclosure, a tool walkthrough or a case study to share, email ask@securepurple.com with a short abstract.
Editions have covered malware analysis, ransomware operator tradecraft, phishing infrastructure, large-scale data breaches, insider threats, cloud misconfiguration and the operational reality of incident response. Discussion is threat-led, not vendor-led.
Yes. The Assembly runs under a clear code of conduct centred on respect, inclusion and responsible disclosure norms. Anti-harassment standards are enforced. Reports go directly to the organising team.
By default, sessions are not recorded. That is part of why attendees are willing to share sensitive research openly. Specific sessions may be recorded with all speakers' consent and published later via Be Internet Secure.
Companies can sponsor editions, contribute mentors from their security teams, or host an edition at their venue. Email ask@securepurple.com with "Hacker's Assembly" in the subject line.
Hackers Assembly punches well above its weight. The calibre of research on stage is what you'd expect at an international con, not a local meetup.
Research presented here would hold up at any international con. The talks aren't watered down for the room; the room is ready for them.