Black Hat USA 2014 Trainings are filling fast!

Register now so you don't miss out on the Training course you want | more info

Educate And Engage Target Audiences While Filling Your Sales Pipeline

Access the largest, most influential community of security technology buyers by aligning your company with the trusted Black Hat brand.

Black Hat Webcasts provide:

  • Cutting edge content covering the hottest security topics from privacy to online and mobile vulnerabilities
  • Top rated speakers highly respected by the community
  • An avg of 875 registered attendees
  • 500 guaranteed leads with option to increase
  • Sponsor speaking opportunity and engagement at the end of the webcast

Leverage the Black Hat brand and resources:

  • 75% of Black Hat USA 2013 attendees report listening to Black Hat Webcasts
  • Over 50% of attendees state that the Black Hat Webcasts apply directly to current and/or future projects
  • Following each webcast, 40% of attendees will visit the sponsor's website for additional information

2014 Webcast Editorial Calendar

Contact the Black Hat Sales Team about sponsoring one of the following webcasts.

JAN
23
Application Security – SOLD
Client Side Security, Browsers • Mobile Devices and Technology • Web Application Firewalls • Denial Of Service
FEB
20
Defense – SOLD
Logging (Collection, Analysis, Correlation) • Incident Response • Malware
MAR
13
Privacy – SOLD
Cryptography • Social Media • Open Source Intelligence • Consumer Devices, Technology, and Services
APR
17
Hardware
Low Level Attacks • Reverse Engineering • Exploit Development • Post Exploitation Activities
MAY
15
Network – SOLD
Network Infrastructure and Technology • SCADA and ICS (Industrial Control Systems) • Internet of Things, autonomous device security and implications
JUN
19
Application Security – SOLD
Client Side Security, Browsers • Mobile Devices and Technology • Web Application Firewalls • Denial Of Service
JUL
17
USA Preview – SOLD
AUG
21
Defense – SOLD
Logging (Collection, Analysis, Correlation) • Incident Response • Malware
SEP
18
Hardware
Low Level Attacks • Reverse Engineering • Exploit Development • Post Exploitation Activities
OCT
9
Network
Network Infrastructure and Technology • SCADA and ICS (Industrial Control Systems) • Internet of Things, autonomous device security and implications
NOV
20
Application Security
Client Side Security, Browsers • Mobile Devices and Technology • Web Application Firewalls • Denial Of Service
DEC
4
Year in Review

LatestIntel

  • Black Hat USA 2014: Pentesting? Thought You'd Never Ask | more info
  • Black Hat Asia 2014: Clever Network
    Tricks | more info
  • Black Hat Asia 2014: Lurkers:
    APTs, RATs, Rootkits, and
    Response | more info
View More

UpcomingEvents

ShowCoverage

StayConnected

Fill out the form below to stay up to date on the latest Black Hat info, newsletters and intel.

Email*
First Name
Last Name
Subscription Group

Sustaining Sponsors