Go back

Hack the Planet: A Recap of Material’s Debut Security Theater

What do you get when you gather a bunch of security professionals in a theater to watch a classic hacker movie? A really good time.

People
September 25, 2025
3m read
3m read
3m listen
3m watch
3m watch
Hack the Planet: A Recap of Material’s Debut Security TheaterHack the Planet: A Recap of Material’s Debut Security Theater
speakers
speakers
speakers
authors
Rajan Kapoor, VP, Security
participants
No items found.
share

What do you get when you gather a bunch of security professionals in a theater to watch a classic hacker movie? A really good time.

Let’s face it: us cybersecurity folks can be a self-serious bunch at times. We deal with complex threats, high stakes, and a constant pressure to “enable the business!” We take our work seriously because we have to.

But for many of us, the journey here started somewhere a lot more fun. It started with stories that sparked our curiosity. Movies where the heroes were the nerds. Films that cemented the healthy paranoia that serves us so well today.

We’re talking about the classics: WarGames, Sneakers, The Matrix, Lawnmower Man. (And no, we are not talking about Swordfish.)

These movies were formative events for many of us, and form a shared cultural touchstone for our industry. However, once you have a few years of IRL experience with hands on keyboards, they’re also patently ridiculous.

A nostalgic chat about some of these movies led to a question: “What if we held a screening of a classic hacking movie and invited 100 of our friends to join us?”

A bit of planning and logistics later, and that "what if" became Security Theater. We kicked off last week with the 1995 rollerblading masterpiece, Hackers. Our goofy little idea gained a whole lot of traction, the registration filled up faster than we could have imagined, and we all had a blast.

It was more than just a movie night

Our goal wasn't just to put a movie on a screen. The community deserved better. We wanted to create an experience that was interactive, a little irreverent, and genuinely fun.

Here’s what that looked like:

  • The Material Cut: We showed a condensed version of Hackers—all the iconic scenes, none of the filler. Straight to the good stuff.
  • Live Commentary: Attendees joined a dedicated Slack channel, and the best real-time commentary, jokes, and hot takes were projected onto a screen next to the movie. It was our own version of Mystery Science Theater 3000, powered by the collective wit of the security community.
  • Buzzword Bingo: Every guest got a bingo card filled with classic hacking tropes ("It's a UNIX system!," "Enhance!," rollerblading, etc.). The first to yell "Bingo!" won some appropriately nerdy prizes.
  • Trivia and Prizes: Before the show, the Big Quiz Thing’s Noah Tarnow hosted a round of movie trivia. After the film, we raffled off a stereotypically-shady-looking Security Theater hoodie, Bose headphones, and a custom macropad keyboard for all our attendees’ hacking needs.
  • After movie cocktails: After the show, we got everyone together at the theater bar for an open bar sponsored by our good friends at Panther.

The idea was simple: get a hundred of our friends and colleagues in a room, give them an open bar and some popcorn, and let everyone relax. No product pitches, no slide decks. 

Why are we doing this?

Because community matters. So often, industry events are transactional. You go to a booth, get a pitch, and scan your badge in exchange for a t-shirt you'll never wear. It feels hollow.

We’d rather build genuine connections. The best measure of our success isn’t a sales metric; it’s when our own customers become our most effective advocates. And that starts by treating people like peers, not prospects. The energy and enthusiasm in the theater confirmed we’re on the right track.

The show must go on

The response to the first Security Theater was overwhelming, and this is just the beginning. The tour continues.

Our next screening will be WarGames at the Roxy Cinema in New York City on November 12th.

If you’ll be in the area, we’d love for you to join us–and bring a friend! But tickets are limited, and if the first event is any indication, they’ll go quickly.

Get Your Ticket for Security Theater: NYC

A huge thank you to everyone who came out, participated in the chaos, and made the premiere of Security Theater a night to remember. We can't wait to see you at the next one.

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

Rajan Kapoor, VP, Security
5
m read
Read post
Podcast

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen to episode
Video

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m watch
Watch video
Downloads

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Watch video
Webinar

The Quiet Phish: Stopping Calendar Invitation Attacks

Learn how to mitigate the risk posted by calendar invitation attacks against Google Workspace and Microsoft 365 accounts.

5
m listen
Listen episode
blog post

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

Rajan Kapoor, VP, Security
m read
Read post
Podcast

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Listen to episode
Video

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m watch
Watch video
Downloads

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Watch video
Webinar

A Time to Build, a Time to Buy - How to Make a Choice

Building security tools in-house is seductive but often leads to costly, resource-draining tech debt, making buying a customizable platform the smarter choice unless the problem involves unique trust issues, an unserved market, or highly specialized environment logic.

m listen
Listen episode
blog post

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

Mike Moran, Ph.D.
7
m read
Read post
Podcast

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen to episode
Video

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m watch
Watch video
Downloads

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Watch video
Webinar

Context Is Everything: Sharpening Account Takeover Detection with Network Intelligence

Material elevates Account Takeover (ATO) detection beyond basic IP logging by integrating real-time network intelligence from Spur, instantly differentiating legitimate remote work from sophisticated proxy-based attacks.

7
m listen
Listen episode
blog post

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

Nate Abbott
3
m read
Read post
Podcast

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen to episode
Video

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m watch
Watch video
Downloads

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Watch video
Webinar

Beyond Block: Why Your Security Stack Needs More Verbs, not More Tools

Modern security demands organizations stop relying on perimeter blocking and adopt a richer vocabulary of proactive capabilities to manage risk dynamically inside collaborative cloud environments.

3
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.

New