Generated by GPT-5-mini| Black Hat (security conference) | |
|---|---|
| Name | Black Hat |
| Status | Active |
| Genre | Computer security conference |
| Frequency | Annual |
| Country | United States; International editions |
| First | 1997 |
| Organizer | Informa PLC; UBM plc (former) |
Black Hat (security conference) Black Hat is an annual series of computer security conferences and briefings that convene researchers, practitioners, vendors, and policy actors for disclosure of software vulnerability research, exploit demonstrations, and technical training. Originating in the late 1990s, the event has expanded into multiple regional editions and forged ties with events such as DEF CON, RSA Conference, CanSecWest, ToorCon, and ShmooCon. Attendees include representatives from Microsoft, Google, Apple Inc., Cisco Systems, Amazon (company), Department of Defense (United States), National Security Agency, Europol, Interpol, and leading academic institutions.
Black Hat began in 1997 as a byproduct of interactions among participants from DEF CON, Electronic Frontier Foundation, L0pht Heavy Industries, Cult of the Dead Cow, and independent researchers active in the 1990s vulnerability ecosystem. Early editions were shaped by figures linked to Kevin Mitnick, Bruce Schneier, Peiter Zatko, Dan Kaminsky, and groups such as Anonymous (hacker group). Ownership and management shifted over time through corporate transactions involving CMP Media, UBM plc, and later Informa PLC, mirroring consolidation seen at RSA Conference and other industry trade events. The conference evolved alongside legislative and regulatory developments such as the Computer Fraud and Abuse Act, debates in the United States Congress, and policy initiatives from European Union bodies.
Black Hat hosts flagship annual briefs in cities including Las Vegas, London, Amsterdam, Tokyo, and Abu Dhabi, often scheduled adjacent to DEF CON and overlapping with regional gatherings like Sakura-Con and Tokyo Game Show for personnel convenience. Each regional event features multiple tracks, keynote addresses from leaders affiliated with Alphabet Inc., Facebook, IBM, Intel, Nordic Council cyber initiatives, and panels including representatives from FBI, Secret Service, Homeland Security (United States Department of), and private sector security firms. The program typically includes a Business Hall with vendors such as CrowdStrike, FireEye, Palo Alto Networks, and Tenable, Inc.; sponsor booths often host demonstrations and product announcements.
Black Hat's training program delivers multi-day technical courses led by instructors with backgrounds at SANS Institute, NCC Group, Mandiant, Kaspersky Lab, and university labs at Massachusetts Institute of Technology, Carnegie Mellon University, Stanford University, and University of Cambridge. Topics span exploit development, reverse engineering, wireless security, cloud forensics, and red-team operations; curricula reference practical tools from Metasploit Project, IDA Pro, Ghidra, Burp Suite, and Wireshark. Corporate cybersecurity teams from Bank of America, Goldman Sachs, JPMorgan Chase, and Citigroup regularly enroll personnel for incident response and threat-hunting modules.
Black Hat briefings have hosted seminal disclosures such as remote code execution techniques affecting products from Microsoft Windows, Apple iOS, Android (operating system), and network devices from Cisco Systems and Juniper Networks. Presentations have included high-profile work by researchers tied to Google Project Zero, Vulnerability Equities Process debates, and zero-day exploit chains used by state-linked actors investigated by FireEye (now Mandiant), Citizen Lab, and Symantec. Demonstrations have covered attacks on SCADA systems used in industrial control contexts like Stuxnet analyses, supply-chain compromises involving SolarWinds, and firmware-level exploits impacting platforms produced by Intel Corporation and ARM Holdings.
Black Hat has faced criticism and controversy over issues such as disclosure policy, vendor coordination, and the ethics of exploit publication—debates mirrored in disputes over the Vulnerability Equities Process and exchanges with actors like Microsoft and Google. Incidents involving rejected or delayed briefings, community disputes with DEF CON organizers, and legal concerns tied to the Computer Fraud and Abuse Act have drawn attention. Concerns about commercialization, vendor influence from firms such as Palantir Technologies and Raytheon, and distinctions between defensive research and offensive tooling echo controversies seen at CanSecWest and in the broader conversations involving Zero Day Initiative and governmental cyber strategies.
Black Hat is produced by corporate event organizers related to Informa PLC with program committees that solicit submissions via a review process involving independent technical reviewers and industry advisory boards that include representatives from security startups, large vendors like Symantec Corporation and institutional stakeholders such as NIST and ENISA. The conference maintains code-of-conduct policies and legal counsel in coordination with law firms experienced in technology matters. Governance models emphasize contractual arrangements with speakers and sponsors, similar to practices at RSA Conference and other major technology events.
Category:Computer security conferences