Black Hat | Company Profile
Company Directory for Black Hat
Black Hat
Overview
Black Hat is a well-known series of cybersecurity conferences and events that began in 1997, founded by Jeff Moss. It focuses on technical information security research, presentations, and training. The event serves as a platform for idea exchange between hackers and software companies, fostering a unique environment of creativity and collaboration. Bold discussions on themes such as cyberwarfare, cryptography, and operating system vulnerabilities have gained Black Hat global recognition.
Offerings include advanced technical briefings, hands-on training courses, and keynote panels. Signature training courses feature topics like shellcoding and threat intelligence. Events are led by industry experts, showcasing the latest in hacking techniques, reverse engineering tools, and emerging cybersecurity trends. Black Hat hosts international editions, including USA and Asia, and is affectionately referred to as "cybersecurity summer camp" or "hacker boot camp."
Basic Information
| Industry | events services |
|---|---|
| Founded | 1997 |
| Revenue | 18.6M |
| Headquarters | South Tower Suite 900, San Francisco, California, United States, 94107 |
| Languages | English |
| Alexa Ranking | 56418 |
Contact Details
- Phone: +1 866-203-8081
- Website: blackhat.com
- LinkedIn: linkedin.com/company/black-hat
- Twitter: twitter.com/blackhatevents
- Facebook: facebook.com/black-hat-events-107691635153
Key Focus Areas & Initiatives
- information security
- events
- cyber security
- cybersecurity
- technical briefings
- training programs
- networking opportunities
- security research
- penetration testing
- offensive security
- defensive security
- global events
- professional development
- security professionals
- corporate security
- government officials
- technology vendors
- cybersecurity trends
- security vulnerabilities
- knowledge exchange
- research archives
- event organization
- sponsorship platforms
- security education
- cybersecurity community
- cutting-edge content
- security technologies
- industry leaders
- security assessments
- application security
- encryption technologies
- security conferences
- knowledge dissemination
- memory forensics
- security automation frameworks
- dns attack mitigation
- security architecture
- incident response tools
- incident response
- security automation tools
- security threat landscape
- security advisories
- security standards
- security updates
- exploit analysis
- cloud supply chain vulnerabilities
- supply chain attack detection
- cybersecurity webinars
- threat actor profiling
- security monitoring
- ics security
- threat intelligence
- security patches
- security automation
- security tools
- security trends
- security services
- security protocols
- security collaboration
- threat detection
- security research open-source tools
- research collaboration
- zero trust architecture
- security events
- forensics
- open-source security tools
- security research tools
- security innovations
- security experts
- threat intelligence sharing
- threat analysis
- security analytics
- threat hunting automation
- supply chain security
- advanced persistent threats
- security incident management
- security training
- exploit research
- live webinars
- vulnerability disclosure
- security patch management
- vulnerability research
- security governance
- ai in security
- security insights
- cyber threat hunting
- security solutions
- threat mitigation
- forensic tools
- cloud-native security
- security frameworks
- security community
- security operations
- security compliance
- security awareness
- security in devsecops
- microarchitecture vulnerabilities
- security vulnerability disclosure
- dnssec attacks
- malware analysis
- cloud misconfiguration
- security policies
- ransomware defense
- security strategies
- information technology and services
- security breach prevention
- attack mitigation
- llm security
- computer systems design and related services
- security best practices
- cloud security
- security reports
- industrial control system security
- security industry
- security data analysis
- security technology
- security analytics tools
- security incident response automation
- security standard compliance
- b2b
- computer & network security
- information technology & services
Technologies Used
- CloudFlare Hosting
- Gmail
- Google Apps
- Marketo
- Microsoft Office 365
- Netlify
- OneTrust
- Slack