Form Section Headline
Primary Background Palettes:Margin Top/Bottom for Section & Margin Bottom for Section Titles.
The possible values are small, medium and large. The pixel values for each option are:
- small: 20px
- medium: 40px
- large: 80px
Please check this link to know more about new company brand guidelines: Guidelines
Please check this link to access to the latest Template User Guide: Guidelines

August 6 | 8:00 a.m. to 9:00 p.m.
Mandalay Bay Hotel
Take a break from the hustle and bustle of the expo floor and recharge with some food and drinks on us.
Pop by to chat strategy with our cybersecurity experts or schedule a 1:1 meeting below for a deeper dive into proactive security strategies.
Make sure you come back after the floor closes for our evening reception.
See what it takes to finally leave reactive security behind. Swing by our booth for immersive demos and a cybersecurity challenge. Discuss security strategies with our technical team and discover how Trend Vision One™, our agentic AI cybersecurity platform, accelerates proactive security outcomes through centralized cyber risk exposure management, security operations, and robust layered protection.
Discuss security strategies with our technical team and discover how Trend Vision One™, our AI-powered enterprise cybersecurity platform accelerates proactive security outcomes through centralized cyber risk exposure management, security operations, and robust layered protection.
Section 1 - Column 3. Praesent non velit ut libero
condimentum pulvinar sed vitae tellus.
Vestibulum
id tristique elit. Suspendisse posuere rutrum
sodales. Nam id elit ac sem iaculis lacinia
posuere vitae metus.
Section 1 - Column 4. Praesent non velit ut libero
condimentum pulvinar sed vitae tellus.
Vestibulum
id tristique elit. Suspendisse posuere rutrum
sodales. Nam id elit ac sem iaculis lacinia
posuere vitae metus.
Threat Hunt Challenge
Play | Hunt | Win
August 6 & 7 | twice every hour | Trend Micro booth #3540
Join the blue side and fight back in this hands-on Trend Vision One challenge. Navigate our agentic AI cybersecurity platform to hunt down threats.
Aside from major bragging rights, the top scorer wins a
Insta360 x4 Waterproof Action Camera.

Section 2 - Column 3. Praesent non velit ut libero
condimentum pulvinar sed vitae tellus.
Vestibulum
id tristique elit. Suspendisse posuere rutrum
sodales. Nam id elit ac sem iaculis lacinia
posuere vitae metus.
Section 2 - Column 4. Praesent non velit ut libero
condimentum pulvinar sed vitae tellus.
Vestibulum
id tristique elit. Suspendisse posuere rutrum
sodales. Nam id elit ac sem iaculis lacinia
posuere vitae metus.
Must-See Presentations
August 7 | 10:15 a.m. | Mandalay Bay K
Inside the State of AI Security: Threat Research from the Front Lines
As enterprises adopt AI, they face new security challenges like vulnerable models and poisoned data. Discover proactive strategies from our State of AI Security report to protect critical AI systems and join us for insights on mitigating emerging risks.
Russell Meyers
VP
Trend™ Research
August 6 | 1:30 p.m. | South Seas C & D, Level 3
From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion
Red teamers face phishing or exploiting challenges when attempting to initial access. Discover stateless tunnels, evasion techniques, and VxLAN vulnerabilities in Linux Kernel and RouterOS. Understand mitigation strategies and explore new research avenues in this comprehensive session.
Shu-Hao Tung
Threat Researcher
Trend Micro
August 7 | 10:20 a.m. | South Seas C & D, Level 3
Peril at the Plug: Investigating EV Charger Security and Safety Failures
As the popularity of EV charging rises, so do cybersecurity risks. Take a look into the real-world consequences of compromised EVSE, destructive testing results, and safety improvements through robust security practices, hardware design, and implementation.
Jonathan Andersson
Sr. Manager, Security Research
Trend Micro
Thanos Kaliyanakis
Hardware Vulnerability Researcher
Trend Micro
August 7 | 2:30 p.m. | South Seas C & D, Level 3
Smart Charging, Smarter Hackers: The Unseen Risks of ISO 15118
ISO 15118 enhances EV charging with smart technology but introduces new challenges. Get a look into how this new standard reshapes the threat landscape, balances improvements with vulnerabilities, and highlights the interplay between innovation, sustainability, and cybersecurity in EV infrastructure.
Salvatore Gariuolo
Senior Threat Researcher, FTR AI and Data
Trend Micro
20 Years of Trend Zero Day Initiative™ (ZDI)
August 6 | 5:00 p.m. to 6:00 p.m. | Trend booth #3540
Join us for a special celebration as ZDI turns 20. Discover two decades of groundbreaking threat research and get a chance to win exciting prizes. Everyone is welcome.
The Vanguard Awards
August 7 | 3:00 p.m. – 4:00 p.m. | Trend booth #3540
Wrap up your Black Hat USA 2025 experience on a high note by celebrating the best in cybersecurity.
Cheer on your peers with awards going to researchers and vendors who’ve lit it up over the past year.
Ranked #1 in Cloud-Native Application Protection Platform Market Share 6 years running
MITRE Engenuity™ ATT&CK Evaluations Achieved 100% detection rate
2024 Gartner® Market Guide for Cloud-Native Application Protection Platforms - Cloud Security is built to protect cloud-native applications
Section 3 - Column 3. Praesent non velit ut libero
condimentum pulvinar sed vitae tellus.
Vestibulum
id tristique elit. Suspendisse posuere rutrum
sodales. Nam id elit ac sem iaculis lacinia
posuere vitae metus.
Section 3 - Column 4. Praesent non velit ut libero
condimentum pulvinar sed vitae tellus.
Vestibulum
id tristique elit. Suspendisse posuere rutrum
sodales. Nam id elit ac sem iaculis lacinia
posuere vitae metus.
See why we’re a global leader
2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms (EPP)
Named a Leader for Endpoint Protection Platforms for the 19th time in a row
2024 Gartner® Market Guide for Cloud-Native Application Protection Platforms
Named a representative vendor
2024 Gartner® Magic Quadrant™ for Email Security Platforms
Named a Leader and among top marks for “Ability to Execute”
Gartner Peer Insights® Customers’ Choice 2024
Scored 4.9 out of 5 for Network Detection and Response (NDR)*
*based on 168 reviews
The Forrester Wave™
Named a Leader in Attack Surface Management Solutions, Q3 2024
IDC MarketScape for Modern Endpoint Security for Enterprises
Named a worldwide Leader in this evaluation

Canalys Global Cybersecurity Leadership Matrix 2025
Third consecutive placement as #1 among the 32 cybersecurity vendors appraised

G2 Grid® for Network Detection and Response (NDR) - Fall 2024
Trend Vision One ranked #1 out of 59 enterprise solutions
2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms (EPP) Named a Leader for Endpoint Protection Platforms for the 19th time in a row
Read more →
2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms (EPP) Named a Leader for Endpoint Protection Platforms for the 19th time in a row
Read more →
2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms (EPP) Named a Leader for Endpoint Protection Platforms for the 19th time in a row
Read more →
AI Summit Panel
August 5 | 9:50 a.m. | Oceanside AD, Level 2
Addressing Real-World AI Security Challenges
AI security is no longer theoretical. Attackers are actively exploiting AI vulnerabilities, and security teams must adapt quickly.
This expert panel will discuss the biggest AI-driven security risks today and how security professionals can proactively defend against them.

Robin Purnell
Director, Product Management
Trend Micro
AI Summit Keynote
August 5 | 11:05 a.m. | Oceanside AD, Level 2
Leading the Future: Real-World Proactive Strategies for Secure and Scalable AI
AI is now the digital backbone of modern enterprise. As generative and agentic AI redefine the threat landscape, reactive defense is insufficient. CISOs must lead the shift to proactive, autonomous cybersecurity to keep pace with AI's rapid evolution.

Rachel Jin
Chief Enterprise Platform Officer
Trend Micro

Bartley Richardson
Senior Engineering Director, Agentic AI
NVIDIA
AI Summit Expo Session
August 6 | 10:15 a.m. | AI Summit Stage in the Business Hall
The Security for AI Blueprint: How to Hack-Proof Your AI Stack
Join this session to learn innovative cybersecurity strategies for protecting AI systems and large language models.
Gain insights on countering adversarial attacks, data poisoning, and prompt injection vulnerabilities, and discover how to safeguard against deepfakes and zero-day exploits.

Fernando Cardoso
VP, Product Management
Trend Micro
AI Summit Keynote
August 5 | 11:00 a.m. | Oceanside AD, Level 2
Leading the Future: Real-World Proactive Security Strategies with Agentic AI and Autonomous Red Teaming
Cybersecurity teams are stuck in a reactive loop. Learn how to break free by predicting and preventing attacks before they happen. Join this keynote for an insider’s look into digital twin tech, agentic AI, and a proactive security framework to enhance your team's effectiveness and foresight.

Rachel Jin
Chief Enterprise Platform Officer
Trend Micro
AI Summit Expo Session
August 6 | 10:15 a.m. | AI Summit Stage in the Business Hall
The Security for AI Blueprint: How to Hack-Proof Your AI Stack
Join this session to learn innovative cybersecurity strategies for protecting AI systems and large language models. Gain insights on countering adversarial attacks, data poisoning, and prompt injection vulnerabilities, and discover how to safeguard against deepfakes and zero-day exploits.

Fernando Cardoso
VP, Product Management
Trend Micro
Section 5 - Column 4. Praesent non velit ut libero
condimentum pulvinar sed vitae tellus.
Vestibulum
id tristique elit. Suspendisse posuere rutrum
sodales. Nam id elit ac sem iaculis lacinia
posuere vitae metus.