Full 1
The most unique hands-on cybersecurity conference
Full 1
Full 1
The most unique hands-on cybersecurity conference
Full 1
Full 2
Live | In-Person | Virtual | Recorded
Over 20 Classes & workshops
Full 2
Full 3
community
Security experts from all over the world converge on Deadwood, South Dakota every October.
Full 3
previous arrow
next arrow

START HERE

Learn everything you need to know about the Wild West Hackin’ Fest conference and how you can get started.

More Info

TRAINING

Join us in-person or virtually for hands-on cybersecurity training brought to you by Antisyphon Training.

More Info

SPEAKERS

Connect with and learn more about our current list of speakers for WWHF Deadwood, 2025!

More Info

WILD WEST HACKIN’ FEST

Deadwood, South Dakota October 2025

Pre-Conference Training: October 7-8, 2025
Live & Virtual Conference: October 8-10, 2025

At Wild West Hackin’ Fest in Deadwood, South Dakota, we turn the traditional conference experience upside down and focus on the community.

Every WWHF includes technical talks, hands-on workshops and labs, expert-led training, and occasional mechanical bull riding—along with countless chances to connect with others.

Join us for a unique experience where you’ll connect with industry professionals, legendary trainers, and some of the brightest minds in cybersecurity — all while participating in exclusive, hands-on events you won’t find anywhere else.

When you go to Wild West Hackin’ Fest, you’ll feel like you’ve “met your people.”

10+ Talks

10+ Training Classes

10+ Workshops

Daily and Nightly Activities

Lobby Con

Community Engagement

View classes

20

On-site training classes

30+

Talks and Presentations

10+

Hands-on Workshops

100%

Fun and Engaging

ON-SITE | VIRTUAL | HANDS-ON | PRACTICAL | AFFORDABLE

Learn to Hack or Defend, sometimes both.

Breaching the Cloud

Instructed by Beau Bullock

Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this training course, hacking concepts will be introduced for each of those services.

Penetration Testing:
Beyond the Basics

Instructed by Tim Medin

Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to inclu

Cybersecurity Incident Command

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Defending M365 & Azure

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Foundations in Space Cybersecurity: Hardware Edition

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Foundations of SOC with Elastic and Jira

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Breaching the Cloud

Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this training course, hacking concepts will be introduced for each of those services.

Penetration Testing: Beyond the Basics

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Cybersecurity Incident Command

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Defending M365 & Azure

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Foundations in Space Cybersecurity: Hardware Edition

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Foundations of SOC with Elastic and Jira

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Breaching the Cloud

Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this training course, hacking concepts will be introduced for each of those services.

Penetration Testing: Beyond the Basics

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Cybersecurity Incident Command

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Defending M365 & Azure

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Foundations in Space Cybersecurity: Hardware Edition

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Foundations of SOC with Elastic and Jira

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Breaching the Cloud

Do you want to level up your cloud penetration testing skills? The attack surface of many organizations has changed to include third-party hosted services such as Amazon Web Services, Microsoft Azure, and Google Cloud Platform. In this training course, hacking concepts will be introduced for each of those services.

Penetration Testing: Beyond the Basics

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Cybersecurity Incident Command

Nam dictum felis sed diam volutpat ultricies. Ut ultricies, dolor eu fermentum molestie, tortor libero pulvinar ipsum, nec congue leo elit at eros.

Announcing the Outlaws, Pioneers, and Pros of Wild West Hackin’ Fest!

Our Speakers

Jason Haddix

Keynote Speaker

Marcello Salvati

Keynote Speaker

Dan McInerney

Keynote Speaker

Tara Wheeler

Speaker

Jeff McJunkin

Speaker

Matt Lee

Speaker

The Future is… in Denver 2026

If you can’t make it out to Deadwood this year, consider joining us next February for WWHF @ Mile High in Denver, Colorado!


Pre-Conference Training: October 7-8
Conference: October 8-10

In-Person Registration Virtual Registration


Pre-Conference Training: February 10-11
Conference: February 11-13

stay up-to-date

Download these Apps

Create your agenda and new relationships from your phone!

Keep Track of Talks

Sign up for Workshops

Communicate with Attendees

Get Support & Help

Sign up and Follow Events

Easy to Use

we herd the happiest nerds

What Our Attendees Say

Lisa D.

Customer

Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. In hac habitasse platea dictumst.

Hanna A.

Customer

Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. In hac habitasse platea dictumst.

Andrew R.

Customer

Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. In hac habitasse platea dictumst.

Cooperation

Our partners

We couldn't make Wild West Hackin' Fest happen without the support of our sponsors. Please reach out to these amazing organizations and let them know we sent you!

Register Before We Sell Out

Praesent molestie tempus sem, in rutrum orci rutrum non suspendisse lacinia aliquam semper.