Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Black Hat USA 2022: What you need to know
  • Cyber Attacks

Black Hat USA 2022: What you need to know

4 years ago Adam Parlett
Black Hat USA 2022: What you need to know

Following a successful hybrid event in 2021 that saw more than 6,000 in-person, and more than 14,500 virtual attendees, Black Hat USA returns in 2022 to the Mandalay Bay Convention Centre in Las Vegas, Nevada. Now in its 25th year, this year’s event has three key components, each equally unmissable, namely these are Trainings, Briefings, and The Business Hall.

Black Hat USA 2022 will open with four days of Trainings on the 6th of August, and will be followed by the two-day main conference taking place on August 10th and 11th. The main conference highlights are the Black Hat Briefings and the Black Hat Business Hall. The former is where industry experts are provided with a platform to share ground-breaking work and ideas, while the latter provides the unique opportunity of networking with thousands of InfoSec professionals.

Trainings

The Black Hat Trainings is a hybrid event comprising a mix of two and four-day courses and takes place from the 6th through the 9th of August, virtually, and in-person. The event offers attendees technical courses covering offensive proactive cybersecurity approaches, defensive reactive approaches, and general approaches that utilize elements of both.

A good example of an offensive course in cloud security, for example, is the 2-day virtual Hacking Cloud Infrastructure course, while an example of a defensive course would be the in-person Cloud Security Hands-On (CCSK+) For Azure. Regardless of whether the course is conducted in-person or remotely, what sets the Black Hat Trainings apart are the bespoke nature of its courses. The Training session courses often take a very hands-on, interactive approach where skilled trainers provide ongoing assessment through incremental challenges concentrated on practical real-world applications.

Attendees who are certified through (ISC)2 and CompTIA can earn 16 Continuing Professional Education (CPE) credits for attending two-day courses and 32 CPE credits for four-day courses. Black Hat does not maintain records of earned CPE credits but provides its own digital certificates and badges to attendees upon completion.

If you’re eager to discover what other courses are on offer during Trainings, then click here to browse the course index.

Briefings

As with Trainings, the Black Hat Briefings this year are being presented both virtually and in-person. Regardless of whether you attend virtually or in-person, passes include access to all recorded Briefings for up to 30 days following the event. In recommending highlights from the Briefings we would focus on the two keynote talks from Chris Krebs and Kim Zetter. Both are acclaimed industry experts who are more than qualified to conduct their holistic presentations which summarise where the cybersecurity landscape currently lies, and what they believe this means for the industry moving forwards.

Chris’s talk will work through today’s risk trends and what they mean for tomorrow’s network defenders. Along the way, the presentation will suggest the shift required in both mind-set and action to successfully deliver better outcomes while recognizing that we’re going to be forever operating in a contested information environment.

Kim’s 60-minute keynote will undoubtedly draw on her extensive experience covering cybersecurity and American national security for over a decade. Kim has repeatedly been voted as one of the top ten security journalists in the country by security professionals and her journalist peers.

To learn more about what Briefings are on offer, click here for the full schedule, and find a relevant Briefing for you and your business.

Business Hall

The Black Hat Business Hall is the third unmissable event we must draw your attention to. We would encourage you to map your route and effectively plan your time by familiarising yourself with the Business Hall floor plan. Three vendors we would recommend you visit are Tripwire, Digital Guardian, and Terranova Security. Tripwire can be located at Booth #2734 where they will have an informal lounge set-up with experts available for unique engagement opportunities. The Digital Guardian team will be providing product demonstrations, theatre presentations, and exciting giveaways over at Booth #1950. Terranova Security will also be in attendance over at Booth #2702 and be available to discuss all-things cybersecurity from their risk-based campaigns through to their Real-World Phishing Simulations.

Black Hat USA remains one of the largest InfoSec conferences on the globe, so it is important to structure your time to get the most benefit from all there is to see at Black Hat USA 2022. The official Twitter account has been promoting this event for a while and will be providing updates throughout the event here. We are all excited for in-person events to return and it is entirely understandable to have some trepidation as we navigate the “new normal” associated with larger-scale events. Please familiarise yourself with the event’s Code of Conduct and stay informed of the steps event organizers are undertaking to ensure your safety.

The post ” Black Hat USA 2022: What you need to know” appeared first on TripWire

Source:TripWire – Adam Parlett

Tags: Cloud, Phishing, TripWire

Continue Reading

Previous Microsoft Resumes Blocking Office VBA Macros by Default After ‘Temporary Pause’
Next Roaming Mantis Financial Hackers Targeting Android and iPhone Users in France

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

7 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

8 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

10 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

11 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

13 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

1 day ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT