Schedule

TBA

We are currently accepting submissions for our Call for Papers. If you would like to share your research, please consider submitting a proposal.

card-img

Call For Papers (CFP)

We invite cutting-edge talk proposals from researchers, practitioners, and hackers who are pushing the boundaries of cybersecurity. Share your insights and shape the future of the field.

  • Networking refers to the time allocated for attendees, including various companies, sponsors, and researchers, to communicate and interact with one another.
  • Track A/B and A+B indicate the use of two separate rooms or a combined space. Transition time between configurations is reflected in the schedule.
  • Note that the schedule is subject to minor changes without prior notice.
  • Unlike many conferences, most speakers at POC will demonstrate real-world hacking—showing often says more than telling.
  • This hands-on approach is what truly sets POC apart.

Organizer

Organizer Logo

Partner Company

Partner Company Logo

Sponsors

POC Conference is made possible thanks to the support of our sponsors. Their continued partnership has played a vital role in sustaining and growing POC over the years. We sincerely thank them for their contribution.

card-img

Become a Sponsor

Join leading offensive security companies from around the world in supporting POC Conference. Connect with a highly engaged technical audience and shape the future of security research. We’re excited to learn more about you and would be happy to share our sponsorship kit. Contact us to explore sponsorship opportunities.

Supporting Friends

  • 0x41con
  • codeblue
  • kunlun
  • dailysecu
  • ekoparty
  • h2hc
  • hardweario
  • hexacon
  • hitcon
  • nopcon
  • nullcon
  • offensivecon
  • phdays
  • sincon
  • theori
  • xcon
  • zeronights