Defining Tomorrow’s Information Security Landscape
The Black Hat Training & Briefings is the leading series of information security conferences that bring together thought leaders from all facets of the computer security industry – from the private and public sectors to academic and even underground researchers. Each conference is comprised highly technical sessions which are provided by the most respected security experts in the world. The environment is is focused on the sharing of practical insights and timely, actionable knowledge.
From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to a conference series with annual live events worldwide. In additional Black Hat continues to develop innovative ways in delivering the latest in security research to its audience through new platforms such as a monthly webcasts series and virtual events.
Black Hat’s decade of leadership attracts the most prestigious names from the full spectrum of security thinkers, and ensures that the conference stays on the leading edge of new security trends as they emerge. Black Hat remains the best and biggest event of its kind, unique in its ability to define tomorrow’s information security landscape.
Black Hat Attendee Titles: CIO, CTO, CISO, CSO, VP and Director of Security, IT VP, Director, Manager, IT, IS, Network Engineer, Integrator, Solution Provider
BLACK HAT EUROPE 2012
Hotel Rey Juan Carlos
In nearly a decade Black Hat Europe has been the forum for showcasing research that addresses the needs of the global security market.
BLACK HAT USA 2012
Las Vegas, NV, USA
The flagship event for the Black Hat conference series has provided a venue for elite security researchers and trainers to meet with over 5000 security professionals annually.
Security news doesn’t always wait for conference season. Black Hat webcasts and virtual events are a regular series of live web events focusing on what’s hot in information security.
Webcast Editorial Calendar
- January 19, 2012 – Faces of Facebook: Privacy in the Age of Augmented Reality
- December 8, 2011 – The State of Security Vulnerabilities in 2011
- November 17, 2011 – Abu Dhabi Preview: Force Multipliers on the Modern Battlefield
- October 27, 2011 – Challenges and Results in Automatic Malware Analysis and Classification
- October 13, 2011 – Workshop: A Taste of the Latest Samurai-WTF DVD
- September 28, 2011 – Digital Forensics, “what is the meaning of this”
- September 21, 2011 – Beyond files undeleting: OWADE
- August 25, 2011 – Black Hat USA Wrap
- July 14, 2011 – Black Hat USA 2011 Preview
- June 23, 2011 – Android Security Overview, Threats, and Best Practices
- June 1, 2011 – PlayStation Network Attack Vectors Expanded
- May 2011 – HTTP Parameter Pollution Vulnerabilities in Web Applications
- April 2011 – Privacy on the Internet
- February 2011 – Gangsterware — Stealth Shield of the Malware
- December 2010 – Attacking with HTML5
- October 2010 – Building the Best Free HUD
- September 2010 – Expanding Compliance to Critical Infrastructure
- August 2010 – Black Hat 2010 USA Wrap Up
- June 2010 – Black Hat 2010 USA Preview
- May 2010 – Cloud Security
- April 2010 – Windows 7 Security
- March 2010 – Auditing/Assessment
- Feb 25, 2010 – Security Starts at the Beginning – Part 2
- Feb 18, 2010 – Exploiting Lawful Intercept
- Jan 2010 – Security Development Lifecycle