Recommended Event: Are you the MVP of cybersecurity? Maryland, US, June 1-3, 2026

Queen City Con 0x4: Cleopatra’s Cipher: Hieroglyphs & Hashes

Basic Event Info

Event Type Conference
Organizer Cannon Fodder Security
Event Date 13 November 2026
Visit Event Visit Event

Location

US State Ohio
City Cincinnati

Event Details

Event Format Physical
Size 500+ approximate delegates
Conference Focus Network Security

Participation Opportunities

Registration (Cost) Not Free
Speaking Opportunities Yes
Speaking Category Free-To-Speak

Event Description

Queen City Con 0x4: Cleopatra’s Cipher — Hieroglyphs & Hashes presents a distinctive exploration of the convergence between ancient innovation and contemporary cybersecurity. The event is designed to immerse participants in a world where digital defense and offense are viewed through the lens of Ancient Egypt. In this setting, secrets were once etched in stone and protected by legendary guardians. Attendees are encouraged to adopt the role of digital archaeologists, deciphering encrypted hieroglyphs and identifying vulnerabilities within a landscape inspired by dynasties, temples, and tombs. This unique approach not only enriches the learning experience but also highlights the enduring relevance of historical methods in modern security practices.

Immersive Talks and Labs: The Scrolls of Knowledge

The event features a series of expert-led sessions and interactive labs that translate ancient wisdom into actionable cybersecurity strategies. Participants engage in a variety of topics, including reverse engineering, cloud security, and digital forensics. Each session is crafted to serve as a crucial component of a broader educational journey. These opportunities are intended to help attendees develop proficiency in both cyber defense and offense, drawing parallels to the ancient scribes who encoded royal decrees to safeguard their realms. The hands-on nature of the labs ensures that theoretical knowledge is reinforced through practical application, fostering a deeper understanding of complex security concepts.

Keynotes and Challenges: Voices of the Pharaohs

Renowned industry leaders and visionaries deliver keynote presentations that influence the direction of cybersecurity. These talks provide valuable insights and inspire attendees to think critically about emerging threats and solutions. A highlight of the event is the high-stakes Capture the Flag (CTF) challenge, where participants tackle intricate puzzles and adversarial scenarios. This competition is designed to test and showcase advanced skills, mirroring the challenges faced by those who sought to unlock the mysteries of the ancient world. The CTF fosters a spirit of collaboration and innovation, encouraging participants to push the boundaries of their expertise.

Villages of the Cyber Nile: Specialized Learning Environments

  • Retro Computer Village: Delve into the origins of computing and hacking by interacting with vintage systems, tracing the evolution of code from its earliest forms.
  • Kali Linux Dojo: Enhance offensive capabilities using Kali Linux and contemporary penetration testing techniques, training in a dynamic environment.
  • Hardware Hacking Village: Gain practical experience by manipulating circuits and embedded systems, exploring the physical aspects of cybersecurity.
  • Lockpicking Village: Develop skills in bypassing physical security controls, recognizing that not all vulnerabilities are digital.
  • Detection Engineering Village: Build detection mechanisms, hunt threats, and strengthen blue team operations to improve threat visibility.
  • Career Village: Network with mentors, recruiters, and peers to advance within the cybersecurity profession and plan a successful career trajectory.
  • Application Security Village: Examine, exploit, and defend applications, with a focus on securing the software supply chain and identifying hidden vulnerabilities.

Decode the Past, Secure the Future

Queen City Con 0x4 continues the tradition of protecting knowledge by equipping attendees with advanced skills and meaningful connections. Whether participants are experienced professionals or newcomers, they will gain a comprehensive understanding of the evolving threat landscape. The event encourages individuals to decode intricate ciphers and fortify future defenses, ensuring that the lessons of the past inform the strategies of tomorrow. Through this blend of historical context and modern expertise, the conference fosters a community dedicated to advancing cybersecurity for years to come.