
We can’t wait to see you at Black Hat USA.
Helping you manage your cyber risk across an ever-expanding digital attack surface is our mission and passion.
We’ve assembled the tools you need, including market-leading XDR, powerful attack surface risk management, advanced threat defense techniques, and global threat research, to take on the many challenges facing cybersecurity experts like you.
We’re so excited to meet you at Black Hat USA and share more about how our unified cybersecurity platform is fundamentally changing the game—both virtually and in-person.
We’re so excited to meet you at Black Hat USA and share more about how our unified cybersecurity platform is fundamentally changing the game—both virtually and in-person.
Section 0 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
What you can look forward to:
Compete In Our Live Challenges
Test your threat hunting skills at our booth, then adopt an adversary mindset at Operation: Red Team, our interactive challenge played for glory and big prizes.
Learn From Global Threat Researchers
Gain insights from our expert speakers at research-based presentations on critical issues facing the world of cybersecurity, as well as practical workshops.
Meet With Industry-Leading Experts
Get hands-on with our unified cybersecurity platform, including XDR and cloud security, in expert-guided demos. And, of course, there’ll be cool giveaways.
Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Join us at Black Hat USA for Operation: Red Team, a high-stakes game of capture the flag that will put your skills to the test. Learn while you play, using offensive strategies to outsmart your opponents and improve your cyber defense skills.
Prizes up for grabs include Sony noise-cancelling headphones, a Prusa i3 MK3S+ 3D printer kit, a Onewheel electric skateboard, and MORE.
Play to win and see what it takes to:
![]() |
Identify weaknesses and risks in your security posture |
![]() |
Bolster your own cyber defenses |
![]() |
Proactively manage risk, eliminate blind spots, and reduce exposure |
Space is limited. Sign up today!
Section 2 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 2 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Recorded live from BHUSA
WATCH NOW >>
Follow Trend Micro's LinkedIn and Twitter for more information
Organizations are already adapting to the new landscape of the Metaverse. What are the hidden risks?
Join our host from Trend Micro's The Zero Day Initiative, Dustin Childs, and our panelist guests, Kevin L. Jackson, Sally Eaves, and Gerald Auger, as they discuss threats to the Internet of Experiences.
Organizations are already adapting to the new landscape of the Metaverse. What are the hidden risks?
Join our host from Trend Micro's The Zero Day Initiative, Dustin Childs, and our panelist guests, Kevin L. Jackson, Sally Eaves, and Gerald Auger, as they discuss threats to the Internet of Experiences.
Section 3 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 3 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Thinking Offensively: Red Teaming In-Person | Virtual: Wednesday, Aug. 10 | 1:50 p.m.-2:40 p.m. PDT Lucas Van Den Berg, Red Team and Incident Response Coordinator, Trend Micro |
Many organizations are considering, or already adopting, goal-based adversarial activities as part of their overall security strategy. At Trend Micro, we have recently built up our capabilities to better protect you. This detailed session will review the lessons we’ve learned on this journey, including red teaming methodologies, defining realistic objectives, leveraging threat intelligence, the TIBER-EU framework, common pitfalls, and more. |
Calculating Risk in the Era of Obscurity: In-Person: Thursday, Aug. 11 | 11:20 a.m.-12:00 p.m. PDT
Brian Gorenc, Sr. Director of Vulnerability Research, Trend Micro Dustin Childs, Senior Communications Manager, Trend Micro |
Complying with industry standards and government regulations requires an understanding of the risk to your resources from poor servicing. While standards exist to help assess risk, vendors can manipulate them, leading to errors. Join this session to uncover examples of systemic problems with security patches and how those problems negatively impact enterprise security, based on our conclusions from disclosing more than 9,500 vulnerabilities over 17 years. |
Reversing Signal with Software-Defined Radio
Sebastian Dudek, Threat Researcher, Trend Micro |
Participate in this session to learn important radio concepts and security risks, then directly apply them with GNU radio to acquire a signal and reverse it. Gain real world experience demodulating and decoding radio signals, building receivers to decode AM and FM channels, and outsmarting common security mechanisms. |
Registered guests can join us at booth #1732 or meet with our experts virtually.
Section 4 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 4 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Our passionate cybersecurity experts look forward to connecting with you during the event for meetings and one-one-one demos—in-person or otherwise.
Registered guests can join us at booth #1732 or meet with our experts virtually.
Section 5 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 5 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Want to Get Started Now?
Sign up for a free, 60-day trial of Trend Micro Vision One™ to modernize
your security operations with industry-leading XDR, attack surface management,
risk scoring, and Zero Trust capabilities.
Section 6 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 6 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.
Section 6 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.