44con Cybersecurity Conference Logo

44CON London 2025: Premier Cybersecurity Conference & Event Details

44CON Information Security Event - London. September 17-19, 2025 at the Novotel London West. This premier event combines an exceptional security conference with hands-on training opportunities.

deco-blob-2 decoration
44con Cybersecurity Conference
44con Cybersecurity Conference Logo
44CON London 2025: Premier Cybersecurity Conference & Event Details
September 17-19, 2025
graphical divider
Note
Important Note

This event is reported to have "the best coffee"

44CON Information Security Event - London

Looking for the ultimate cybersecurity gathering in the UK? Look no further than 44CON, scheduled for September 17-19, 2025, at the Novotel London West. This premier event combines an exceptional security conference with hands-on training opportunities, making it the UK's best information security event for professionals seeking to enhance their skills and knowledge.

44CON has built a reputation for quality content, bringing together security experts, researchers, and practitioners from across the industry. The event features a carefully curated program of talks, workshops, and networking opportunities that address the most pressing challenges in cybersecurity today, including persistent issues in IoT security and other emerging threats.

Planning ahead is essential as this popular event typically sells out. The 2024 edition (September 18-20) is currently open for registration, and the Call for Papers closes May 31, 2024, for those interested in presenting. We're proud to mention that beyond the exceptional content, 44CON is also known for having "the best coffee" - because even security professionals need proper fuel!

Key Takeaways

  • 44CON combines high-quality security conference programming with practical training opportunities in London on September 17-19, 2025.
  • The event features expert speakers, workshops on critical security topics, and valuable networking opportunities for cybersecurity professionals.
  • Registration opens well in advance with the 2024 event already accepting attendees and speaker submissions through May 31.

Overview of 44CON Information Security Event

44CON has established itself as a premier information security conference in the UK, bringing together experts, researchers, and professionals from across the cybersecurity landscape. The event combines high-quality technical content with valuable networking opportunities in a distinctively collaborative atmosphere.

History and Evolution

44CON first emerged on the cybersecurity conference scene as a response to the growing need for specialized security events in the United Kingdom. Over the years, we've watched it develop from a modest gathering into one of the UK's most respected information security conferences.

The event has maintained its technical focus while expanding its scope to address emerging threats and technologies. Since its inception, 44CON has prioritized quality research presentations and practical security knowledge over commercialization.

The conference name "44CON" has become synonymous with technical excellence in the UK cybersecurity community, with each year building on previous successes to enhance the overall experience for attendees.

Event Format and Structure

44CON typically runs for three days, with the 2024 event scheduled for September 18-20 at the Novotel London West. The conference structure includes a thoughtful mix of activities designed to maximize learning and engagement.

The main program features:

  • Technical talks by leading security researchers
  • Hands-on workshops for practical skills development
  • Training sessions ranging from beginner to advanced levels
  • Networking events to connect with industry peers

The Call for Papers (CFP) process is highly competitive, ensuring only the highest quality presentations make it to the conference floor. For 2024, the CFP closes on May 31st, giving potential speakers ample time to prepare their submissions.

Significance in the Cybersecurity Community

44CON has earned its reputation as a valuable event that covers a broad spectrum of security topics, including network security, cryptography, malware analysis, and digital forensics. What sets it apart is its balanced approach between theoretical research and practical application.

Many significant security findings and tools have debuted at 44CON highlighting its importance as a platform for cutting-edge research. The conference attracts both established security professionals and newcomers to the field.

Unlike larger commercial events, 44CON maintains an intimate atmosphere where genuine conversations happen and meaningful connections form. This community-focused approach has helped cultivate a loyal following of attendees who return year after year for the unique blend of technical depth and professional networking.

Location and Venue Details

44CON takes place at the Novotel London West, providing attendees with a central location in one of the world's most vibrant cities. The venue offers modern facilities with excellent accessibility and nearby accommodation options.

London as a Host City

London serves as the perfect backdrop for 44CON, the UK's premier security conference. As a global hub for technology and finance, the city attracts security professionals from across Europe and beyond.

The capital's excellent transportation links make it accessible for international attendees, with five major airports and the Eurostar terminal providing connections to worldwide destinations.

London's rich cultural landscape offers plenty to explore outside conference hours. From world-class museums and theaters to diverse dining options, attendees can experience British culture while networking with peers.

The city's strong cybersecurity community adds value to the event, with many leading security firms and professionals based in London, creating opportunities for meaningful industry connections.

Venue Highlights

The Novotel London West provides an ideal setting for 44CON with its spacious conference facilities. The venue features modern amenities including high-speed Wi-Fi, comfortable seating, and excellent audiovisual equipment.

Conference areas are designed to accommodate various session formats, from large keynote presentations to intimate workshop spaces. This flexibility enhances the learning experience for all attendees.

The venue's dedicated exhibition space allows sponsors and vendors to showcase their latest security solutions effectively. Comfortable networking areas encourage informal discussions and connections between sessions.

Catering at the venue receives consistent praise, with 44CON proudly noting they have "the best coffee" – an essential element for any tech conference!

Accessibility and Accommodation

The Novotel London West offers excellent accessibility features, with step-free access throughout the venue and accessible facilities for all attendees. We prioritize inclusivity to ensure everyone can participate fully in the conference.

Staying on-site at the Novotel provides maximum convenience for attendees. The hotel offers comfortable rooms with modern amenities, allowing quick access to early morning sessions and late-night networking events.

For those preferring alternative accommodations, numerous hotels at various price points are located within walking distance or a short tube journey from the venue.

The venue's location in Hammersmith provides excellent public transportation connections. It's easily accessible via the Piccadilly and District lines, with Hammersmith station just minutes away. For international travelers, Heathrow Airport is only a 30-minute journey on the Piccadilly line.

Conference Program Overview

The 44CON conference features a diverse program balancing red, blue, and purple team talks covering network security and other critical information security topics. Our carefully curated content spans from beginner-friendly sessions to advanced technical presentations.

Keynote Sessions

44CON 2024 brings together renowned information security experts to deliver thought-provoking keynote sessions. Leading practitioners share cutting-edge research and practical insights that shape the industry's future.

Each keynote runs approximately 60 minutes, leaving ample time for audience Q&A. We've scheduled sessions throughout both conference days to maintain high energy and engagement.

This year's keynotes explore critical topics including zero-day vulnerability management, advanced persistent threat mitigation, and regulatory compliance frameworks. Our selection committee has prioritized speakers with demonstrated expertise and presentation skills.

Every keynote is recorded and made available to attendees after the event through our secure portal.

Panel Discussions

Interactive panel discussions create valuable opportunities for diverse perspectives on complex security challenges. Our panels bring together experts from different sectors to debate current issues and emerging trends.

Each panel features 4-5 industry leaders and a skilled moderator to guide the conversation. We encourage active audience participation through live polling and curated questions.

Panel topics for 44CON 2024 include:

  • Ransomware Resilience: Prevention and recovery strategies
  • Cloud Security Challenges: Real-world implementation hurdles
  • Security Talent Gap: Building effective teams in a competitive market
  • Regulatory Landscape: Navigating compliance requirements across jurisdictions

Panels typically run 45-60 minutes with designated networking time afterward to continue discussions informally.

Workshops and Training

Our hands-on workshops and training sessions provide practical skills development in controlled environments. These interactive learning opportunities range from half-day sessions to comprehensive two-day training events.

Workshop topics include:

  • Container security exploitation techniques
  • Digital forensics and incident response
  • Red team tactics and adversary emulation
  • Secure coding practices and application security

All training sessions include lab materials, detailed documentation, and post-event support. Participants work with real-world scenarios under expert guidance.

Workshop sizes are limited to ensure personalized attention and optimal learning outcomes. Many workshops sell out quickly so early registration is advised for popular information security conference activities.

Most sessions provide certification of completion, valuable for professional development requirements.

Key Topics and Focus Areas

44CON tackles pressing cybersecurity challenges through expert presentations and hands-on workshops. Attendees gain valuable insights into evolving threats and innovative defense approaches that help organizations strengthen their security posture.

Cyber Threats and Defense Strategies

The cybersecurity landscape continues to evolve with increasingly sophisticated attack vectors. At 44CON, we explore current and emerging cyber threats facing organizations today.

Sessions cover critical topics like advanced persistent threats, ransomware evolution, and supply chain vulnerabilities. These presentations provide real-world examples and case studies of successful attacks.

More importantly, penetration testing and digital forensics workshops offer practical defense strategies. Attendees learn hands-on techniques for:

  • Vulnerability assessment methodologies
  • Incident response planning
  • Security architecture design principles
  • Threat hunting capabilities

The conference particularly emphasizes IoT security challenges and the need for fundamental changes in securing connected devices, an area often overlooked in traditional security approaches.

Threat Intelligence Innovations

Modern threat intelligence tools and methodologies take center stage at 44CON. We examine how organizations can effectively gather, analyze, and implement threat intelligence to stay ahead of attackers.

Presentations showcase cutting-edge technologies like AI-powered threat detection systems and automated intelligence gathering platforms. These innovations help security teams identify potential threats before they materialize.

Expert-led sessions demonstrate practical applications of threat intelligence in:

  1. Early warning systems
  2. Attribution techniques
  3. Adversary profiling
  4. Strategic defense planning

The conference also addresses challenges in intelligence sharing between organizations and sectors. Discussions explore frameworks for better collaboration while maintaining necessary confidentiality.

Workshops provide hands-on experience with threat intelligence platforms, helping attendees develop skills to implement these solutions in their own environments.

Risk Management Trends

Effective risk management forms the foundation of robust cybersecurity programs. At 44CON, we examine evolving approaches to identifying, assessing, and mitigating security risks.

Presenters share frameworks for quantifying cybersecurity risks in financial terms, helping organizations make informed investment decisions. These methodologies bridge the gap between technical and business perspectives.

Critical issues in cyber security are addressed through the lens of organizational risk, including:

  • Regulatory compliance challenges
  • Third-party risk management
  • Cloud security governance
  • Data privacy considerations

The conference emphasizes practical risk assessment techniques that organizations can immediately implement. Attendees learn how to develop comprehensive risk registers and prioritization matrices.

Case studies of successful risk management programs demonstrate how organizations have effectively reduced their attack surface while optimizing security investments.

Training and Workshop Opportunities

44CON offers extensive hands-on learning opportunities to help attendees enhance their cybersecurity skills. These sessions are designed to address real-world challenges with practical solutions and techniques that can be immediately applied in professional environments.

Professional Skill Development

Carefully curated training sessions led by industry experts who bring years of practical experience to the classroom. Each training event is designed to address specific skill gaps in the cybersecurity landscape. Participants can choose from beginner to advanced tracks covering topics like penetration testing, digital forensics, and secure coding practices.

Our trainers understand the evolving requirements of security professionals in today's threat landscape. Sessions typically run in small groups of 15-20 participants to ensure personalized attention and optimal learning conditions.

Training certificates are provided upon completion, which can be used for continuing professional education credits. Many of our workshops fulfill requirements for various industry certifications.

Technical Demonstrations

Featured live demonstrations of cutting-edge security tools and techniques throughout the conference. These sessions showcase practical applications of theoretical concepts and provide attendees with a deeper understanding of how to implement security solutions.

Our technical demonstrations include:

  • Threat hunting with the latest detection tools
  • Vulnerability exploitation in controlled environments
  • Security hardening of various systems and applications
  • Incident response workflows and procedures

Presenters often share ready-to-use scripts and configurations that attendees can implement in their organizations. We ensure all technical content is vetted for accuracy and practical relevance before being presented at 44CON.

Interactive Labs

Hands-on lab environments where participants can practice newly learned skills in realistic scenarios. These interactive workshop sessions provide immediate feedback and reinforce learning through practical application.

Labs feature:

  1. Capture-the-flag challenges tailored to different skill levels
  2. Red team vs. blue team exercises in simulated network environments
  3. Forensic analysis of compromised systems
  4. Secure development practice stations

Each lab is equipped with all necessary hardware and software. We provide detailed lab guides that participants can take back to their organizations. Many security professionals cite our interactive labs as the most valuable component of their 44CON experience.

No prior experience is required for beginner labs, while advanced sessions list specific prerequisites to ensure participants get the most value from their time.

Networking and Community Building

44CON creates valuable opportunities for security professionals to connect and share knowledge. The event emphasizes building a healthy infosec community through structured networking sessions and interactive activities.

Industry Networking Sessions

At 44CON there are specialized networking sessions where security professionals can exchange ideas and build meaningful connections. These sessions often include structured meet-and-greets, roundtable discussions, and informal gatherings during coffee breaks.

Evening receptions provide relaxed environments where attendees can continue conversations started during daytime sessions. We ensure these networking opportunities are accessible to everyone, from seasoned professionals to newcomers in the field.

The conference deliberately creates spaces with reliable network access so professionals can demonstrate tools and techniques in real-time. Many lasting professional relationships and collaborations begin during these networking moments.

Community-Led Activities

They encourage active participation through various community-led activities throughout the 44CON event. These include hands-on workshops, collaborative capture-the-flag competitions, and problem-solving challenges that foster teamwork.

The popular "44CON OTR" (Off The Record) sessions feature unannounced speakers sharing stories they can't tell when cameras are rolling. These candid discussions help build trust within the community.

Our hackathon events encourage cross-team collaboration, with participants working together to solve real-world security problems. They also organize social activities like gaming tournaments and themed dinners that help break down barriers between different security disciplines.

Community feedback shapes these activities, ensuring they remain relevant and valuable for all participants. This collaborative approach strengthens the UK infosec community beyond just the days of the conference.

Notable Attendees and Speakers

44CON attracts an impressive lineup of security professionals who share cutting-edge insights and expertise. The conference brings together both established industry figures and innovative thinkers who are shaping the future of information security.

Industry Experts

At 44CON they regularly welcome distinguished industry experts who bring decades of practical experience to the conference. For example James Forshaw - a renowned security researcher - has presented talks on complex topics like Kerberos security tooling at previous events. His expertise in Windows security makes his sessions particularly valuable for attendees.

The conference prides itself on featuring speakers who remain accessible throughout the event. Unlike other information security conferences where presenters quickly disappear, 44CON speakers often stay to engage with participants. This creates unique networking opportunities for security professionals.

The conference maintains a balance of red, blue, and purple team experts covering network security and other specialized domains. This diversity ensures attendees gain comprehensive perspectives on current security challenges.

Thought Leaders

44CON consistently attracts thought leaders who drive innovation in information security. These visionaries share forward-thinking approaches that help attendees prepare for emerging threats and opportunities.

The conference's exclusive OTR (Off The Record) evening represents a highlight for many participants. During this special Thursday session, industry pioneers provide unfiltered insights in a more intimate setting, creating what organizers describe as "where the real magic happens."

Approachability of speakers adds tremendous value to the 44CON experience. Many thought leaders not only present their research but actively participate as attendees themselves, fostering meaningful conversations throughout the conference.

The carefully curated speaking roster reflects 44CON's commitment to showcasing diverse perspectives from across the information security landscape.

44CON in the Context of Global Security Events

44CON has established itself as a significant player in the global information security conference landscape. The event brings unique perspectives to the cybersecurity community while maintaining strong connections with other major security events worldwide.

Comparison with SANS and BSides

44CON offers a different approach compared to larger corporate events like SANS or the community-driven BSides London. While SANS focuses on structured training programs with certification paths, 44CON blends high-quality talks with practical workshops in a more intimate setting.

BSides events typically embrace an unconference format with grassroots community involvement. 44CON, however, maintains a curated selection process for its talks and workshops, ensuring consistent quality while still preserving the community spirit.

Attendees often participate in both 44CON and BSides London, as they complement each other well. BSides offers emerging research and new voices, while 44CON provides a platform for more developed research and established speakers.

Relation to Infosecurity Europe

Infosecurity Europe represents the commercial and vendor-focused side of the industry, while 44CON maintains a stronger technical emphasis. The two events serve different purposes in the UK security calendar.

Infosecurity Europe attracts thousands of attendees with hundreds of vendors, making it ideal for broad industry networking. In contrast, 44CON's venue at Novotel London West creates a more focused environment with typically 400-600 participants.

44CON looks to fill the gap between massive trade shows and small community gatherings. Many security professionals attend both events, using Infosecurity Europe for vendor connections and 44CON for deeper technical insights.

Collaborations with BruCON, DeepSec, and HackInParis

44CON maintains strong relationships with similar European security conferences. BruCON (Belgium), DeepSec (Austria), and HackInParis (France) share similar philosophies about security research presentation.

Several talks presented at 44CON 2024 will likely appear at other European events, reflecting an interconnected community of security researchers and practitioners.

Challenges and Emerging Trends

The information security landscape continues to evolve rapidly, presenting both new challenges and opportunities for professionals attending 44CON. Security teams must navigate complex requirements while adapting to technological shifts.

New Security Requirements

The cybersecurity field faces increasingly stringent compliance demands across multiple sectors. Organizations attending 44CON must balance regulatory requirements with practical security implementations.

Many companies struggle with the implementation of zero-trust architecture, which has become essential rather than optional. This approach requires verification at every access point, challenging traditional network security models.

Supply chain security has emerged as a critical focus area, with recent high-profile breaches highlighting vulnerabilities. Many information security professionals at 44CON are sharing strategies for third-party risk management.

Cloud security requirements have also become more complex, demanding specialized knowledge and tools that many organizations are still developing.

Adapting to Digital Transformation

Digital transformation initiatives have accelerated dramatically, creating new security challenges for IT teams. It's often seen that organizations struggle to maintain security while rapidly adopting cloud services, IoT devices, and remote work technologies.

Security professionals at cybersecurity conferences like 44CON are increasingly discussing DevSecOps integration. This approach embeds security throughout the development lifecycle rather than applying it as an afterthought.

AI and machine learning present a double-edged sword - offering new defensive capabilities while creating novel attack vectors. Security teams must understand both aspects to remain effective.

Remote workforce security remains challenging, with traditional perimeter-based security models becoming obsolete. Organizations need comprehensive endpoint protection strategies and user education programs.

The skills gap continues to widen as technology outpaces available expertise, making knowledge-sharing at events like 44CON increasingly valuable for the security community.

Sponsors and Industry Partners

44CON attracts top cybersecurity companies that provide valuable support and expertise to this premier UK security event. These partnerships enhance the conference experience while showcasing cutting-edge security solutions for attendees.

NordLayer's Role

NordLayer serves as a Diamond sponsor for 44CON 2024, bringing their expertise in secure network access to the conference. As a leading security provider, they offer comprehensive protection for businesses of all sizes.

NordLayer demonstrate their solutions through interactive sessions at the event. Their team engages directly with attendees, providing insights into modern security challenges and solutions.

Their sponsorship contributes significantly to 44CON's ability to deliver high-quality content and experiences. NordLayer's presence reinforces the event's commitment to featuring the most relevant security technologies in today's landscape.

Adaptive Network Access Security Solutions

The focus on adaptive network access security represents one of the core technological themes at 44CON. These solutions provide dynamic protection that adjusts to changing threats and user behaviors.

We highlight how these technologies help organizations maintain security while supporting remote work and BYOD policies. Adaptive solutions offer context-aware security controls that balance protection with usability.

At 44CON, demonstrations of these network access security technologies show practical implementations for organizations of various sizes. The solutions featured include zero-trust architectures, conditional access policies, and continuous authentication methods.

These approaches represent the future of security - moving beyond static perimeters to intelligent, responsive protection models. This aligns perfectly with 44CON's mission of showcasing forward-thinking security practices.

Frequently Asked Questions

Here are the key details about the upcoming 44CON event in London, covering dates, tickets, training, speakers, and sponsorship opportunities. We've gathered this information to help attendees plan their participation in this information security conference.

What are the dates for the upcoming 44CON Information Security Event in London?

The next 44CON Information Security Event will take place in London in September 2025. This annual conference typically runs for four days, with two days dedicated to training workshops and two days for the main conference activities.

Mark your calendars now and checking the 44CON homepage for the exact dates as they are confirmed.

How can I purchase tickets for the 44CON Information Security Event in London?

Tickets for 44CON can be purchased directly through the official website. We offer several ticket types including full conference passes, single-day passes, and special training workshop tickets.

Early bird discounts are typically available for those who register several months in advance. Group discounts may also apply for organizations sending multiple team members.

Will there be training sessions available at the 44CON event, and how can I register for them?

Yes, 44CON offers specialized training sessions during the first two days of the event. These sessions cover various information security topics ranging from penetration testing to threat intelligence.

Registration for training sessions is separate from the main conference registration. We recommend securing your spot early as these specialized workshops often sell out quickly due to limited capacity.

Is there a schedule of speakers and topics for the 44CON Information Security Event?

The full schedule of talks and workshops is typically published about two months before the event. 44CON features a balanced mix of red, blue, and purple team presentations covering network security and other key areas.

We select speakers through a Call for Papers (CFP) process that ensures high-quality content across various information security disciplines. The schedule includes keynotes, technical presentations, and hands-on demonstrations.

Can I still participate as a sponsor or exhibitor at the upcoming 44CON Information Security Event?

Yes, sponsorship and exhibitor opportunities are available for the upcoming 44CON event. We offer various sponsorship tiers with different benefits and visibility options for companies looking to connect with the information security community.

Interested organizations should contact the 44CON team as soon as possible, as premium sponsorship positions tend to fill quickly. Each sponsorship package includes booth space, passes, and marketing opportunities.

How does 44CON compare to other information security events like BSides London?

44CON is a mid-sized information security conference that focuses on technical depth and community building. Unlike larger commercial events, we maintain a more intimate setting that facilitates networking and detailed discussions.

Compared to BSides London, 44CON typically features longer sessions, more intensive training options, and attracts a mix of corporate and independent security professionals. We pride ourselves on building a healthy community with balanced content that serves various information security specialties and experience levels.

Event Details
When
September 17-19, 2025
Where
Novotel London West
Country
United Kingdom
Event Type
Cyber Security

Other Events

BlackHat USA
Black Hat USA 2025

Black Hat USA provides multiple tracks covering everything from emerging threats to advanced protection strategies.

Read Story