Best of Black Hat: 20 Epic Talks in 20 Years
In celebration of Black Hat's 20th birthday, we take a look back at the most memorable presentations and demos since the show's inception in 1997.
This year marks the 20th anniversary of Black Hat, the information security conference founded by Jeff Moss in 1997. What began as a single meetup in Las Vegas has expanded around the world to host events in the United States, Europe, and Asia.
Over the years, Black Hat has brought together CISOs, researchers, academics, IT specialists, analysts, federal employees, cryptographers, and many other security professionals to learn about, and discuss, the threats and trends shaping their industry.
Much of the learning takes place in the Black Hat Briefings, which were created to give security pros a place to discover new threats and developments that could potentially put them at risk. Each year, researchers take the conference stage to share their latest work and exploits.
Twenty years is a long time in an industry where threats change by the minute. The many vulnerabilities exposed at Black Hat have affected everything from consumer devices to critical infrastructure.
For example, anyone who was at Black Hat 2010 recalls when the late Barnaby Jack, then director of research at IOActive, demonstrated how a cybercriminal could compromise an ATM and steal cash, copy customers' card data, or learn the machines' master passwords.
Information released at Black Hat has proven groundbreaking and game-changing for those in attendance. Here, we take a look back at the "best of" Black Hat talks, discoveries, and moments over the past 20 years.
Do you have a favorite Black Hat moment that didn't make this list? If so, we'd love to hear about it! Feel free to share your thoughts in the comments.
Read more about:
Black Hat NewsAbout the Author
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024