An update from Trend Micro

Surrounding the recent updates indicating that Las Vegas has been newly identified as hot spot for the COVID-19 Delta variant, we have made the difficult decision to withdraw our in-person presence at Black Hat.

All virtual activities will continue as planned in support of the event. While we’re disappointed to miss the opportunity to meet with peers, customers, and partners onsite, we are still committed to conducting business virtually through the event platform. 

With the right combination of our innovative technology strategy, global threat research, and passionate people, we make cybersecurity a thing of beauty.

The result: Our industry-leading cybersecurity platform protects hundreds of thousands of organizations like yours across clouds, networks, devices, and endpoints, enabling them to go further and do more.

That's The Art of Cybersecurity.


Section 0 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 0 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

What you can look forward to:

Trend Micro Exploit Elimination Challenge

Compete alongside your peers from across the globe to win big prizes along with some major bragging rights.

down-arrow.png

Speaking Sessions Featuring New Research

Gain research-driven insights into the current issues facing the cybersecurity world.

down-arrow.png

Demos and Meetings with Security Experts

Experience our cybersecurity platform in action, including XDR and cloud security. Plus, enter to win serious prizes.

down-arrow.png

Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Think you have what it takes to be a vulnerability researcher?

August 4  | Virtual

Join us for the Trend Micro Exploit Elimination Challenge and put yourself in the shoes of a vulnerability researcher. You’ll gain access to exclusive intel and toolkits while you compete to be the first to develop protection and counter a threat in real-time.

This is your time to show you have what it takes to:

  • Analyze code differences from patching
  • Identify different attack vectors to reach the vulnerability
  • Develop protection to disrupt the exploits

Compete alongside your global peers. The challenge opens on Wednesday, August 4 at 11 a.m PDT. No Black Hat registration required. Prizes range from a DJI Mini, a GoPro HERO9 bundle, and a 3D printer! Limited spots available, so sign up today.

Section 2 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 2 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Speaking Sessions

Virtual

Attack Driven Development: Leveraging
Threat Intelligence to Build Better Products

Virtual | Wednesday, August 4 | 11:50 a.m.-12:10 p.m. PDT

Brian Gorenc

Brian Gorenc, Sr. Dir. of Vulnerability Research, Trend Micro

How does vulnerability research and threat intelligence filter into building a better solution?

This exclusive talk gives you an insider’s look into how Trend Micro’s end-to-end threat research provides unparalleled access into all phases of a bug’s life cycle—from hunting to reporting, patching, and exploitation.

You’ll also gain an understanding into how Trend Micro researchers’ advanced investigation and analysis of global threats provides class-leading protections for our customers.


How an XDR Approach Drives Faster Response
& Zero Trust Decisions

Virtual | Wednesday, August 4 | 8:00 a.m.-8:15 a.m. PDT
Also available in On-Demand Zone

Headshot_Eric-Skinner_200x200_Round.png

Eric Skinner, VP of Market Strategy, Trend Micro

XDR has accelerated accurate manual and automated detection and response by correlating in-depth telemetry from key activity areas that include email, endpoint, network, and identity services.

Join this session for easy-to-digest correlations on how XDR differs from SIEM. You’ll also gain insight into how XDR visibility helps power Zero Trust decisions by providing continuous health assessments for devices, identities, and applications.

Fear not, this will not be a vendor pitch.


Capture the Signal: Running Wireless IoT CTFs, remotely!

Virtual | Wednesday, August 4 | 11:00 a.m.-12:00 p.m. PDT

    

Víctor Mayoral-Vilches, Robotics Security Researcher, Alias Robotics
Federico Maggi, Senior Threat Researcher, Trend Micro Research
Jonathan Andersson, Manager, Trend Micro Research

The famous DEFCON CTF is one of the thousands CTF contests that have become the lifeblood of the cybersecurity community. CTF players reverse engineer vulnerable services in traditional IT applications (like web and binary) to score points. In normal circumstances, we've hosted the game on site at conferences worldwide, where radio signals are distributed over the air.

In this session, learn how Trend Micro designed and implemented a containerized solution that eliminates the complexity of deploying physical radio transmitters, using an RF-over-IP broadcasting technique due the diverse local regulations in terms of wireless transmissions. With this framework, we can easily deploy CTF contests in countries with strict wireless regulation and remotely, backed by any cloud provider that offer container services.


Small Wonder: Uncovering Planned Obsolescence Practices in Robotics and What This Means for Cybersecurity

Virtual | Thursday, August 5 | 1:30 p.m.-2:10 p.m. PDT

  

Víctor Mayoral-Vilches, Robotics Security Researcher, Alias Robotics
Federico Maggi, Senior Threat Researcher, Trend Micro Research

Security in robotics is nothing new if one considers modern OT and IT approaches, and most security practices translate directly to robots. However, there's almost no security culture amongst robot makers.

This briefing will explore the systematic "robot teardown" as an approach to repair robots by understanding their internals (still obscure).

We demonstrate several tricks from the trade and the legal implications learned by porting reverse-engineering practices into the less-explored field of robotics.

How an XDR Approach Drives Faster Response & Zero Trust Decisions

<Date & time>

Virtual | 15-minute on-demand session

Headshot_Eric-Skinner_200x200_Round.png

Eric Skinner, VP of Market Strategy, Trend Micro

XDR has accelerated accurate manual and automated detection and response by correlating in-depth telemetry from key activity areas that include email, endpoint, network, identity services.

Join this session for easy-to-digest correlations on how XDR is different from SIEM. You’ll also gain insight into how XDR visibility is helping power Zero Trust decisions by providing continuous health assessment for devices, identities, and applications. Fear not, this will not be a vendor pitch!

Section 3 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 3 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Demos and Meetings with Our Passionate Security Experts

Virtual

We have hundreds of passionate security experts and data scientists around the world constantly gathering intelligence to better protect our customers.

Connect virtually for a live demo and to speak one-on-one with an expert.

Stop by the booth or connect virtually for a live demo and to speak one-on-one with an expert.

Section 4 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 4 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

How to connect at Black Hat USA 2021

Attendees with any level pass, including the complimentary business hall pass,
will have access to our virtual booth.


Section 5 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 5 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 5 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.