DEF CON Hacking Conference Bans Pablos Holman, Vincenzo Iozzo, and Joichi Ito Amid Epstein Fallout

DEF CON Bans Three Prominent Tech Figures Over Links to Jeffrey Epstein

INFORMATIONAL
February 19, 2026
3m read
Policy and ComplianceRegulatoryOther

Related Entities

Organizations

Other

Pablos HolmanVincenzo IozzoJoichi ItoMIT Media LabSlashID

Full Report

Executive Summary

DEF CON, one of the world's most prominent hacking conferences, has taken the decisive step of permanently banning three high-profile individuals from all future events: Pablos Holman, Vincenzo Iozzo, and Joichi 'Joi' Ito. The bans, announced on February 18, 2026, were enacted after their names and associations with the late financier and convicted sex offender Jeffrey Epstein were detailed in newly released U.S. Department of Justice (DOJ) documents. While none of the individuals are accused of criminal wrongdoing in relation to Epstein, the conference's action signifies a strong statement on community ethics and standards, aiming to sever any perceived ties between the hacker community and Epstein's criminal enterprise.


Regulatory Details

The action was prompted by the public release of DOJ files related to the Epstein case. These documents included correspondence and records showing Epstein's interest in the hacker community and his interactions with the banned individuals.

  • Vincenzo Iozzo: The founder of SlashID and a former Black Hat board member, was shown in correspondence to have discussed securing DEF CON badges for Epstein in 2016 and 2018.
  • Pablos Holman: A well-known hacker and inventor, was reported to have been in contact with Epstein for years and had discussed attending the conference with him.
  • Joichi Ito: The former director of the MIT Media Lab, was included due to his previous, well-documented scandal where he resigned from MIT in 2019 after admitting to accepting significant donations from Epstein for the lab.

DEF CON added the three to its public "Banned Individuals" list, a move intended to enforce a code of conduct and maintain the integrity of the event. A spokesperson for Iozzo criticized the decision as a "rush to judgement" and "entirely performative," stating his interactions were professional and that he never witnessed illegal activity.

Affected Organizations

The primary organization taking action is DEF CON. The individuals affected are:

  • Pablos Holman: Inventor, futurist, and venture partner at Deep Future.
  • Vincenzo Iozzo: CEO of SlashID, cybersecurity executive.
  • Joichi Ito: Former Director of the MIT Media Lab, academic.

Impact Assessment

  • Community Standards: The ban sets a precedent for ethical conduct and association within the cybersecurity and hacker communities. It signals that even non-criminal association with figures like Epstein is grounds for exclusion from community events.
  • Reputational Consequences: The public ban serves as a significant reputational blow to the individuals involved, regardless of their direct involvement in Epstein's crimes. It formally links their professional identities to the scandal.
  • Industry Debate: The move has sparked debate within the industry about "cancel culture" versus accountability. While many support DEF CON's decision to uphold ethical boundaries, others, like Iozzo's spokesperson, argue it's an unfair judgment without due process.
  • Conference Integrity: For DEF CON, the action is a move to protect its brand and ensure the conference remains a safe and respected space, free from the taint of the Epstein scandal.

Compliance Guidance

This event offers several points of guidance for organizations and professionals regarding ethics and compliance:

  1. Due Diligence on Associations: Professionals and organizations should conduct thorough due diligence on funders, partners, and high-profile associates. Association with individuals involved in criminal or unethical behavior can lead to severe reputational damage.
  2. Clear Code of Conduct: Events and organizations should have a clear, public, and enforceable code of conduct that addresses not only direct actions but also associations that could harm the community's integrity.
  3. Crisis Management: The responses from the individuals and the statement from DEF CON highlight the need for a clear crisis management strategy when dealing with issues of public ethics and reputation.

Timeline of Events

1
September 7, 2019
Joichi Ito resigns as director of the MIT Media Lab over his financial ties to Jeffrey Epstein.
2
February 18, 2026
DEF CON adds Pablos Holman, Vincenzo Iozzo, and Joichi Ito to its public list of banned individuals.
3
February 19, 2026
This article was published

Timeline of Events

1
September 7, 2019

Joichi Ito resigns as director of the MIT Media Lab over his financial ties to Jeffrey Epstein.

2
February 18, 2026

DEF CON adds Pablos Holman, Vincenzo Iozzo, and Joichi Ito to its public list of banned individuals.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

DEF CONEpsteinethicscybersecurity communityPablos HolmanVincenzo IozzoJoichi Ito

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.