Black Hat Briefings
This article is part of a series on |
Computer Hacking |
---|
History |
|
Hacker culture & ethic |
|
Conferences |
|
Computer crime |
|
Hacking tools |
|
Practice sites |
|
Malware |
|
Computer security |
|
Groups |
|
Publications |
|
Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together a variety of people interested in information security ranging from non-technical individuals, executives, hackers, and industry leading security professionals. The conference takes place regularly in Las Vegas, Barcelona, London, Abu Dhabi. The conference has also been hosted in Amsterdam, Tokyo and Washington, D.C. in the past.[1][2]
Contents
1 History
2 Culture
3 Purpose
4 Arsenal
5 Antics and disclosures
6 See also
7 References
8 External links
History
Black Hat was founded in 1997 by Jeff Moss, who also founded DEF CON. Today, Moss is the Conference Chair of the Black Hat Review Board.[3] These are considered[by whom?] the premier information security conferences in the world. Black Hat started as a single annual conference in Las Vegas, Nevada and is now held in multiple locations around the world.[4] Black Hat was acquired by CMP Media, a subsidiary of U.K.-based United Business Media (UBM) in 2005.[5][6]
Culture
Black Hat is typically scheduled prior to DEF CON with many attendees going to both conferences. Black Hat has been perceived by the security industry as a more corporate security conference whereas DEF CON is more informal.
Purpose
The conference is composed of two major sections, the Black Hat Briefings, and Black Hat Trainings. Training is offered by various computer security vendors and individual security professionals. The conference has hosted the National Security Agency's information assurance manager course, and various courses by Cisco Systems, Offensive Security, and others.[7][8]
The Briefings are composed of tracks, covering various topics including reverse engineering, identity and privacy, and hacking. The briefings also contain keynote speeches from leading voices in the information security field, including Robert Lentz Chief Security Officer, United States Department of Defense; Michael Lynn; Amit Yoran, former Director of the National Cyber Security Division of the Department of Homeland Security;[2][9] and General Keith B. Alexander, former Director of the National Security Agency and former commander of the United States Cyber Command.[10]
Arsenal
To engage attendees with hands-on demonstrations and the ability to speak to vendors or security professionals, the Black Hat Arsenal (Arsenal) has been added since 2011.[11] ToolsWatch maintains an archive of all Black Hat Briefings Arsenals.[12]
Antics and disclosures
Black Hat is known for the antics of its hacker contingent, and the disclosures brought in its talks. Conference attendees have been known to hijack wireless connections of the hotels, hack hotel television billing systems, and even hack the automated teller machine in a hotel lobby. In 2009, web sites belonging to a handful of security researchers and groups were hacked and passwords, private e-mails, IM chats, and sensitive documents were exposed on the vandalized site of Dan Kaminsky, days before the conference. During Black Hat USA in 2009, a USB thumb drive that was passed around among attendees was found to be infected with the Conficker virus, and in 2008, three men were expelled for packet sniffing the press room local area network.[13]
In the past, companies have attempted to ban researchers from disclosing vital information about their products. At Black Hat USA in 2005, Cisco Systems tried to stop Michael Lynn from speaking about a vulnerability that he said could let hackers virtually shut down the Internet.[2] However, in recent years, researchers have worked with vendors to resolve issues, and some vendors have challenged hackers to attack their products.[14][15][16][17]
See also
- Hacker conference
- Chaos Communication Congress
- DEF CON
- Summercon
- Positive Hack Days
References
^ "Black Hat". blackhat.com..mw-parser-output cite.citation{font-style:inherit}.mw-parser-output .citation q{quotes:"""""""'""'"}.mw-parser-output .citation .cs1-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/6/65/Lock-green.svg/9px-Lock-green.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .citation .cs1-lock-limited a,.mw-parser-output .citation .cs1-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/d/d6/Lock-gray-alt-2.svg/9px-Lock-gray-alt-2.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .citation .cs1-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/a/aa/Lock-red-alt-2.svg/9px-Lock-red-alt-2.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registration{color:#555}.mw-parser-output .cs1-subscription span,.mw-parser-output .cs1-registration span{border-bottom:1px dotted;cursor:help}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Wikisource-logo.svg/12px-Wikisource-logo.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output code.cs1-code{color:inherit;background:inherit;border:inherit;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;font-size:100%}.mw-parser-output .cs1-visible-error{font-size:100%}.mw-parser-output .cs1-maint{display:none;color:#33aa33;margin-left:0.3em}.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registration,.mw-parser-output .cs1-format{font-size:95%}.mw-parser-output .cs1-kern-left,.mw-parser-output .cs1-kern-wl-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right,.mw-parser-output .cs1-kern-wl-right{padding-right:0.2em}
^ abc "Computer Security Conferences Attract Both Hackers, Anti-Hackers". Fox News. 4 August 2006.
^ "Black Hat". blackhat.com.
^ "Black Hat ® About Black Hat". blackhat.com.
^ "UBM news releases". Media. Retrieved 2016-11-03.
^ "CMP Media Buys Black Hat". Retrieved 2016-11-03.
^ "Black Hat ® DC 2009 Training Index". blackhat.com.
^ "Black Hat ® Europe 2009 Training Index". blackhat.com.
^ "Archived copy". Archived from the original on 2009-02-11. Retrieved 2009-08-15.CS1 maint: Archived copy as title (link)
^ "Commander of U.S. Cyber Command and National Security Agency Director, General Keith Alexander, To Keynote Day One of Black Hat USA 2013" (Press release). WWBT-TV NBC 12, WorldNow (Gannaway). May 14, 2013. Archived from the original on June 15, 2013. Retrieved June 13, 2013.
^ "Black Hat ® Technical Security Conference: USA 2011 // Black Hat Arsenal: Call for Tools". blackhat.com.
^ "ToolsWatch.org – The Hackers Arsenal Tools Portal » Arsenal". www.toolswatch.org. Retrieved 2016-11-03.
^ "Hanging with hackers can make you paranoid". CNN. 4 August 2009. Archived from the original on January 22, 2015.
^ "Security Expert: PC Media Players Full of Holes". Fox News. 3 August 2007.
^ "Microsoft Dares Security Experts to Find Holes in Windows Vista". Fox News. 4 August 2006.
^ "Microsoft Challenges Hackers On Vista". CBS News. 3 August 2006.
^ Associated Press (2 August 2009). "Hackers expose weakness in trusted sites - Technology & science - Security". NBC News. Retrieved 2014-10-09.
.mw-parser-output .refbegin{font-size:90%;margin-bottom:0.5em}.mw-parser-output .refbegin-hanging-indents>ul{list-style-type:none;margin-left:0}.mw-parser-output .refbegin-hanging-indents>ul>li,.mw-parser-output .refbegin-hanging-indents>dl>dd{margin-left:0;padding-left:3.2em;text-indent:-3.2em;list-style:none}.mw-parser-output .refbegin-100{font-size:100%}
Adi Nae Gamliel (July 31, 2017). "Black Hat 2017: Reflection of $82B innovative industry and security professionals protecting the evolution of digital transformation". LinkedIn.
External links
- Official website