Generated by GPT-5-mini| Black Hat Briefings | |
|---|---|
| Name | Black Hat Briefings |
| Genre | Security conference |
| Founded | 1997 |
| Frequency | Annual |
| Country | United States; global editions |
| Organized | Various security firms; originally DEF CON spinoff |
Black Hat Briefings Black Hat Briefings is a series of professional security conferences focusing on computer security, information security, and cybersecurity research and training. Founded as a technical forum, it attracts attendees from Microsoft Corporation, Cisco Systems, NSA, CIA, KrebsOnSecurity, and EFF as well as researchers from MIT, Stanford University, Carnegie Mellon University, and University of Cambridge. Presentations often influence policy at institutions such as U.S. Department of Homeland Security, European Union Agency for Cybersecurity, NATO, and private sector entities including Google LLC, Amazon.com, Inc., Facebook, Inc., and Apple Inc..
Black Hat Briefings functions as a venue where security researchers, vendors, and government representatives exchange findings related to malware analysis, vulnerability disclosure, penetration testing, and cryptography. Regular participants include professionals associated with RSA Security, Symantec Corporation, Trend Micro, Kaspersky Lab, Palo Alto Networks, FireEye, and CrowdStrike. The event features vendors such as VMware, Inc., Intel Corporation, AMD, Oracle Corporation, and IBM demonstrating defensive tools alongside independent researchers from groups like L0pht Heavy Industries, Cult of the Dead Cow, Chaos Computer Club, and Project Zero. Attendees range from representatives of Bank of America, JPMorgan Chase, Goldman Sachs, and BlackRock to law enforcement agencies including FBI, Interpol, and Europol.
Origins trace to the late 1990s when security discourse moved from underground forums such as Hackers on Planet Earth and DEF CON to professional settings influenced by figures linked to Kevin Mitnick, Tsutomu Shimomura, Adrian Lamo, and organizations like L0pht. Early iterations intersected with developments at IETF meetings and policy debates in the U.S. Congress and European Parliament. Over time, format changes paralleled technological shifts marked by milestones at RSA Conference, the publication of tools like Metasploit Framework, and incidents involving Stuxnet, Sony Pictures hack, WannaCry and NotPetya. The conference expanded geographically to include editions in London, Tokyo, Singapore, Las Vegas, Dubai, and Barcelona, reflecting global concerns highlighted by reports from ENISA, SANS Institute, and Verizon Data Breach Investigations Report.
Programs typically include briefings, hands-on training, and vendor expos. Training sessions are conducted by instructors affiliated with SANS Institute, Offensive Security, MITRE Corporation, NCC Group, and HackerOne. Briefings have been delivered by researchers connected to Google Project Zero, Microsoft Research, Apple Security Engineering, Facebook Security, and independent teams such as Team Cymru and The Honeynet Project. The expo hall features booths from Splunk, Elastic NV, Check Point Software Technologies, Fortinet, Akamai Technologies, Cloudflare, and RSA Security LLC. Community events and capture-the-flag competitions run alongside vendor showcases, frequently attracting teams from DEF CON CTF, pwn2own, CyberPatriot, and university groups from MIT CSAIL, Stanford Computer Security Lab, and ETH Zurich.
Landmark disclosures presented at the conference have included exploits and analyses later discussed alongside incidents like Heartbleed, Shellshock, Spectre, and Meltdown. Researchers from Google, Apple, Microsoft, Kaspersky Lab, ESET, McAfee, Trend Micro, Sophos, SentinelOne, NCC Group, and Unit 42 have unveiled zero-day exploits, firmware attacks on UEFI/BIOS, and vulnerabilities affecting SCADA and ICS systems used by companies such as Siemens and Schneider Electric. Academia has been represented by work from CMU, Stanford, Berkeley, Oxford University, and Technische Universität München on topics including machine learning adversarial attacks and side-channel analysis. High-profile talks have sparked media coverage from outlets like The New York Times, The Guardian, Wired (magazine), The Washington Post, and BBC News.
The conference has influenced disclosure norms adopted by stakeholders including MITRE, ISO/IEC, CISA, NIST, and FIRST. Tools and methodologies showcased have been integrated into offerings from Rapid7, Qualys, Nessus, and Burp Suite providers. Collaboration fostered at briefings has led to joint research between entities such as Microsoft Threat Intelligence Center, Google Threat Analysis Group, Cisco Talos, and academic labs at Harvard University, Yale University, and Princeton University. Policy discussions at the event have fed into legislative and regulatory work involving U.S. Congress, European Commission, Australian Cyber Security Centre, and Japan's METI.
The conference has faced criticism over the disclosure of exploits that critics argue aided actors associated with Shadow Brokers and incidents like the Equifax data breach. Debates echo controversies tied to researchers such as Charlie Miller and disputes over coordinated disclosure practices championed by Tavis Ormandy and Marcus Hutchins. Commercialization and vendor presence have drawn comparisons to debates at RSA Conference and concerns raised by civil liberties organizations like Electronic Frontier Foundation and ACLU regarding surveillance tools. Legal incidents have involved participants and regulators from jurisdictions including United States Department of Justice, UK's National Cyber Security Centre, and regional authorities in Singapore and UAE.
Related conferences include DEF CON, RSA Conference, Chaos Communication Congress, ShmooCon, CanSecWest, BlueHat, ToorCon, Hack In The Box, Black Hat Europe, Black Hat Asia, and regional events such as AusCERT, FIRST Conference, OWASP Global AppSec, and SANS Cyber Threat Intelligence. Academic and industry workshops often coincide with venues like Usenix Security Symposium, IEEE Symposium on Security and Privacy, NDSS, ACM CCS, and Black Hat USA editions in major tech hubs such as San Francisco, Las Vegas, and London.
Category:Computer security conferences