We can’t wait to see you at Black Hat USA.

Helping you manage your cyber risk across an ever-expanding digital attack surface is our mission and passion.

We’ve assembled the tools you need, including market-leading XDR, powerful attack surface risk management, advanced threat defense techniques, and global threat research, to take on the many challenges facing cybersecurity experts like you.

We’re so excited to meet you at Black Hat USA and share more about how our unified cybersecurity platform is fundamentally changing the game—both virtually and in-person.


We’re so excited to meet you at Black Hat USA and share more about how our unified cybersecurity platform is fundamentally changing the game—both virtually and in-person.

Section 0 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

What you can look forward to:

Compete In Our Live Challenges

Test your threat hunting skills at our booth, then adopt an adversary mindset at Operation: Red Team, our interactive challenge played for glory and big prizes.

down-arrow.png

Learn From Global Threat Researchers

Gain insights from our expert speakers at research-based presentations on critical issues facing the world of cybersecurity, as well as practical workshops.

down-arrow.png

Meet With Industry-Leading Experts

Get hands-on with our unified cybersecurity platform, including XDR and cloud security, in expert-guided demos. And, of course, there’ll be cool giveaways.

down-arrow.png

Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Operation: Red Team

In-Person on Aug. 10 and 11

Join us at Black Hat USA for Operation: Red Team, a high-stakes game of capture the flag that will put your skills to the test. Learn while you play, using offensive strategies to outsmart your opponents and improve your cyber defense skills.

Prizes up for grabs include Sony noise-cancelling headphones, a Prusa i3 MK3S+ 3D printer kit, a Onewheel electric skateboard, and MORE.

Play to win and see what it takes to:

Identify weaknesses and risks in your security posture

Bolster your own cyber defenses

Proactively manage risk, eliminate blind spots, and reduce exposure

Space is limited. Sign up today!

Section 2 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 2 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.


Recorded live from BHUSA
WATCH NOW >>

Follow Trend Micro's LinkedIn and Twitter for more information

Organizations are already adapting to the new landscape of the Metaverse. What are the hidden risks?

Join our host from Trend Micro's The Zero Day Initiative, Dustin Childs, and our panelist guests, Kevin L. Jackson, Sally Eaves, and Gerald Auger, as they discuss threats to the Internet of Experiences. 

Organizations are already adapting to the new landscape of the Metaverse. What are the hidden risks?

Join our host from Trend Micro's The Zero Day Initiative, Dustin Childs, and our panelist guests, Kevin L. Jackson, Sally Eaves, and Gerald Auger, as they discuss threats to the Internet of Experiences. 

Section 3 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 3 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Speaking Sessions

Thinking Offensively: Red Teaming

In-Person | Virtual:  Wednesday, Aug. 10 | 1:50 p.m.-2:40 p.m. PDT
Business Hall Theatre B

Brian Gorenc

Lucas Van Den Berg, Red Team and Incident Response Coordinator, Trend Micro

Many organizations are considering, or already adopting, goal-based adversarial activities as part of their overall security strategy. At Trend Micro, we have recently built up our capabilities to better protect you.

This detailed session will review the lessons we’ve learned on this journey, including red teaming methodologies, defining realistic objectives, leveraging threat intelligence, the TIBER-EU framework, common pitfalls, and more.


Calculating Risk in the Era of Obscurity:
Reading Between the Lines of Security Advisories

In-Person: Thursday, Aug. 11 | 11:20 a.m.-12:00 p.m. PDT

Headshot_Eric-Skinner_200x200_Round.png   

Brian Gorenc, Sr. Director of Vulnerability Research, Trend Micro

Dustin Childs, Senior Communications Manager, Trend Micro


Complying with industry standards and government regulations requires an understanding of the risk to your resources from poor servicing. While standards exist to help assess risk, vendors can manipulate them, leading to errors.

Join this session to uncover examples of systemic problems with security patches and how those problems negatively impact enterprise security, based on our conclusions from disclosing more than 9,500 vulnerabilities over 17 years.


Reversing Signal with Software-Defined Radio

   

Sebastian Dudek, Threat Researcher, Trend Micro

Participate in this session to learn important radio concepts and security risks, then directly apply them with GNU radio to acquire a signal and reverse it.

Gain real world experience demodulating and decoding radio signals, building receivers to decode AM and FM channels, and outsmarting common security mechanisms.

Registered guests can join us at booth #1732 or meet with our experts virtually. 

Section 4 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 4 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Let's Connect

Our passionate cybersecurity experts look forward to connecting with you during the event for meetings and one-one-one demos—in-person or otherwise.


Registered guests can join us at booth #1732 or meet with our experts virtually. 

Section 5 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 5 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Want to Get Started Now?

Sign up for a free, 60-day trial of Trend Micro Vision One™ to modernize
your security operations with industry-leading XDR, attack surface management,
risk scoring, and Zero Trust capabilities.


Section 6 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 6 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 6 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.