Go back

Hack Week 2024 Recap

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures.

People
September 18, 2024
2m read
2m read
2m listen
2m watch
2m watch
Hack Week 2024 RecapHack Week 2024 Recap
speakers
speakers
speakers
authors
Material Team
participants
No items found.
share

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures.

What is Hack Week?

Hack Week at Material Security is our annual week-long Hackathon where everyone works with whomever they want on whatever they want—without any predefined processes, meetings, or team structures. To be clear though, “whatever they want” isn’t about building jetpacks or a new surfboard: projects must be broadly related to Material Security and must be demonstrated to the whole company before we all head home at the end of the week. 

Hack Week gives us space to explore things in a low pressure environment–allowing enough time and space for teammates to explore their ideas, collaborate, and have fun. As a remote-first company, it's one of a handful of critical times per year where we come together in-person and get to know one another and spend quality time together. Everyone is encouraged to form truly cross-functional teams, so people who don’t normally work directly together can get time with each other–as well as benefit from the creativity and talent across the entire company. 

Hack Week Highlights

Hack Week has been a huge success for Material on multiple levels. We’ve only been running these for a couple of years, but already in that short time we’ve already had multiple critical elements of our products spring from Hack Week projects. On top of that, the week creates room for personal growth and exploration, giving everyone a chance to step out of their comfort zone.

Hack Week isn’t just a four day creative jam session though. We take a break out of our day-to-day work to connect with our teammates at a variety of events. This past Hack Week’s events included:

  • “Material Girls” Cocktail Hour for those a part of our women’s group at Material Security
  • Afternoon team building activities at the San Francisco Museum of Modern Art (SFMOMA)
  • Company and team dinners
  • “Mandatory Fun” on the last night of Hack Week to hang out, reflect, and enjoy the culmination of a fulfilling week… complete with beverages and food trucks.

Similar to last year, the 2024 Hack Week projects featured ideas and executions that fit seamlessly into our strategic objectives and tactical approaches. With so many great ideas, we of course had to have a full slate of awards at the end of the week–loosely themed around the Olympics and a smattering of inside jokes. So without further ado, we want to show love and appreciation to our winners:

  • Zoom Has Tabs Now (Most Cross-Functional Project): This award went to an internal tooling focused project that’s useful to teams involved in a growing product space.
  • Turkish Sharpshooter (Most Business Impact): The winner of this award devised an approach to our infrastructure that makes our business more scalable.
  • Australian Breakdancing (Most Ambitious): The team that brought home this trophy built an approach to a future product space we hope to pursue within the next year (stay tuned!).
  • Laura’s Robot (Best Overall): This coveted award went to a design/front-end focused project that’s already been deployed externally, and can already seen in our product and website!

We want to thank the nearly 100 folks who joined us this year for Hack Week–and a special shout out to the dedicated team who planned and executed the activities throughout the week! We can’t wait to see everyone again for our next get together at our Annual Company Kickoff–and then again for Hack Week 2025!

Frequently Asked Questions

Find answers to common questions and get the details you need.

No items found.

Related posts

Our blog is your destination for expert insights, practical tips, and the latest news in technology. Stay informed with our regular updates and in-depth articles. Join the conversation and enhance your understanding of the tech landscape.

blog post

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

Patrick Duffy
5
m read
Read post
Podcast

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Listen to episode
Video

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m watch
Watch video
Downloads

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Watch video
Webinar

The Future Belongs to Defenders: Stopping the Silent Cloud Compromise

We’re done letting attackers weaponize trust in the cloud workspace: Material gives defenders the integrated visibility and automated control necessary to instantly stop threats like APT-29 the moment they sign in.

5
m listen
Listen episode
blog post

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

Rajan Kapoor, VP, Security
3
m read
Read post
Podcast

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Listen to episode
Video

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m watch
Watch video
Downloads

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Watch video
Webinar

Live Hacking: Exposing the Reality of Microsoft 365 Breaches

Join Huntress CEO Kyle Hanslovan for a live, technical demonstration exposing real-world Microsoft 365 breaches and modern defense strategies.

3
m listen
Listen episode
blog post

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

Nate Abbott
5
m read
Read post
Podcast

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m listen
Listen to episode
Video

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m watch
Watch video
Downloads

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m listen
Watch video
Webinar

Shadow AI: The Productivity Tools In Your Security Blind Spot

Unsanctioned AI tool usage by employees is rapidly expanding the attack surface of organizations, creating critical security blind spots that require immediate and informed management to balance productivity and risk.

5
m listen
Listen episode
blog post

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

Abhishek Agrawal
3
m read
Read post
Podcast

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m listen
Listen to episode
Video

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m watch
Watch video
Downloads

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m listen
Watch video
Webinar

Hack Week 2025 Recap

Our annual Hack Week brings together cross-functional teams to rapidly prototype creative ideas, inspired by customer insights, that improve our product and foster collaboration, innovation, and team bonding.

3
m listen
Listen episode
Privacy Preference Center

By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.