HACKING
VILLAGE
Are you ready to showcase your expertise, share groundbreaking ideas, and empower a global audience of cybersecurity enthusiasts? The Hacking Village at the Barcelona Cybersecurity Congress 2025 is calling all hackers, researchers, and technologists to submit workshop proposals that will leave attendees inspired, challenged, and equipped to tackle real-world cybersecurity threats.
Hacking Partner

WHAT CAN YOU OFFER?
This is not a platform for sales pitches but a chance to share your expertise and demonstrate how your solutions solve real-world cybersecurity challenges. By participating, you can:
- Educate and Empower: Deliver workshops that provide practical skills and actionable insights attendees can apply in their organizations.
- Showcase Innovation: Highlight the value of your tools or services through interactive, hands-on sessions that demonstrate their effectiveness in addressing critical threats.
- Engage a Diverse Audience: Connect with decision-makers, security operators, and enthusiasts eager to learn and adopt impactful solutions.
WHY PARTICIPATE?
-
• Engage with a global audience of cybersecurity professionals.
• Showcase your expertise on an international platform.
• Provide organizations with practical, actionable knowledge they can use to address critical cybersecurity challenges.
• Receive recognition as a thought leader in the cybersecurity community.
• Network with peers, industry leaders, and potential collaborators.
WORKSHOP OPPORTUNITIES
Contribute 1.5–2 hour workshops that are hands-on, practical, and valuable for attendees at all levels of expertise. Topics might include advanced threat detection, cloud security, social engineering defense, or any other area where your expertise shines.
TAKE THE STAGE WITHOUT SELLING
Focus on teaching, demonstrating, and inspiring. Attendees want actionable insights, not sales presentations—this is your chance to truly stand out by delivering real value.
KEY TOPICS OF INTEREST
FOCUS AREAS
- Provide hands-on, interactive experiences.
- Explore advanced hacking techniques, tools, or frameworks.
- Highlight emerging threats and innovative defenses.
- Cater to a range of skill levels, from beginner to advanced.
- Foster collaboration and critical thinking among participants.
- Demonstrate how your material addresses organizational cybersecurity challenges and creates value by improving skills, processes, and defenses.
WORKSHOP GUIDELINES
Duration
Approximately 1.5 hrs
Format
Interactive, with a strong emphasis on practical exercises.
Audience
Diverse attendees, including security professionals, researchers, developers, and enthusiasts.
Facilities
Workshops will have access to state-of-the-art labs and high-speed internet. Let us know your specific tech requirements.
SUBMISSION REQUIREMENTS
- Title: A concise and captivating title.
- Abstract: A 200-300 word summary of your workshop, highlighting why your material is valuable for organizations seeking to enhance their cybersecurity posture.
- Outline: A detailed agenda, including hands-on components and key takeaways.
- Presenter Bio(s): Highlight your expertise and previous speaking experience.
- Technical Needs: Specify any special equipment or software requirements.
Let’s redefine cybersecurity—together. See you in Barcelona!
Supported by
What's in Store
Technical workshops
Engaging and practical exercises, demonstrations, and discussions providing a deeper understanding of specific areas, led by the best cybersecurity experts.
Discussions
Dynamic debates and idea exchanges, covering various themes like education in cyber, talent development strategies, women’s impact in tech, and other hottest cybersecurity topics.
Talks
Lively presentations and dialogues with inspiring speakers featuring trending subjects and offering insights into the latest developments as well as thought-provoking ideas within the field.
Capture the Flag
Thrilling Capture the Flag competitions lead by top companies like Crowdstrike and CaixaBank, that challenge participants with cybersecurity puzzles and scenarios, providing invaluable hands-on experience.
Bug Bounties
Rewarding competition for encouraging tech enthusiasts to discover and report vulnerabilities in the systems contributing to overall cybersecurity development.
Networking
Our interactive space facilitates new connections, exchanging insights, and cultivating collaboration with peers and industry leaders.
PROFILES
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
ECCC Access 2 Market
Calling all innovative European cybersecurity scale-ups operating with solutions within health and critical infrastructure! This event presents a golden opportunity for you to shine. 🥇

MEET OUR GAMES AND ACTIVITIES!
SECURITY IS THE GAME, BY OPERA
Bug Bounty contest: Play or Hack? (Pre-Registration needed)
*pre-registration required. Once you have your ticket, you can sign-up for the activity in your private Visitor Area
The City of Cyber Counts (Online and Offline Quest)
*pre-registration required. Once you have your ticket, you can sign-up for the activity in your private Visitor Area
Your Connection is Not Private (Open-Source Intelligence Challenge)
*pre-registration required. Once you have your ticket, you can sign-up for the activity in your private Visitor Area
CyberAttack! Game, by Exhale Global
CyberAttack! invites participants to put themselves in the role of key organisational functions as the fictitious Trojan Horse Adventures theme park faces a series of attacks against its systems – just as a huge launch is about to take place. Get fresh insight into the importance of team work, leadership and cyber crisis management across functions outside of your own, and adopt a new perspective on how best the cyber security team can support the wider business to minimise disruption in the event of a breach.
*pre-registration required. Once you have your ticket, you can sign-up for the activity in your private Visitor Area
CYBER INVESTOR DAYS 2023
The most promising European cybersecurity start-ups and SMEs will have a chance to pitch their innovative cybersecurity solutions and hold B2B meetings with the leading investors and corporates from Europe and beyond.

COME, LEARN, AND HAVE FUN
Find awe-inspiring activities, workshops, sessions and games at our Hacking VIllage! The ideal place to meet with othe Cybersecurity professionals




10.00-10.15
10.30-11.00
11.00-12.20
11:00-11:10
11.30-12.20
12:30-12:55
Hacking Village welcome and introductions, agenda of the day
Bug Bounty welcome and start of the competition
Women4Cyber presents Hacking Gender Barriers
Welcome word by Hannah Tufts, Exhale Global/Dasha Diaz, itrainsec
Fireside chat with Eduvigis Ortiz and Saskia Brugman hosted by Hannah Tufts
Evolving Security Threat Landscape: A focus on new adversaries, Valentine Ouaki, Crowdstrike
13.00-13.10
13.10-14.00
14.00-15.00
15.05-15.35
15.40:-16.00
Bug Bounty results
Lunch
Maltego OSINT Investigations Workshop, Carlos Fragosa and Mathieu Gaucheler, Maltego
TBD
TBD
MAY 11
AGENDA HACKING VILLAGE
MAY 11
10.00-10.15
10:15-10.45
11.00-13.00
11:00-11:20
11.20-11.50
12:00-13:00
13.00-13:10
Hacking Village welcome , Bug Bounty start
TBD
Hunting Mummy Spider – Capture the Flag by Crowdstrike
Team introduction, CTF goals and rules
Platform training (Falcon Console, hunting capability)
CFT
Q&A and results
14.00-14.40
14.45-15.15
15.20-15.50
Digital Wellbeing for cybersecurity professionals workshop, Hannah Tufts, Exhale Global
TBD
TBD