RSS feed logo header graphic

Black Hat Sustaining Sponsors

We are pleased to announce the following companies as Sustaining Sponsors for 2007.

Interested in sponsorship opportunities? Contact us.

Black Hat Sustaining Sponsor: IOActive

Established in 1998, IOActive is a professional security consulting firm specializing in information risk management and application security analysis for global organizations and software development companies.

To our credit, IOActive is one of three firms in the world that were tasked by Microsoft with the security code review of the Vista client operating system.

Unlike commoditized network security services and off the shelf code scanning tools, IOActive performs gap analysis on information security policies and protocols, and conducts in-depth analysis of information systems, software architecture and source code using leading information risk management security frameworks and carefully focused threat models.

As a home for highly skilled and experienced computer security professionals, IOActive has attracted the likes of Dan Kaminsky, Chris Paget, Dinis Cruz, Jason Larsen, Josh Schmidt, Theodore Ipsen, key advisors like Steve Wozniak, and a crew of unequivocally talented "white-hat" hackers who, before being asked to host the infamous Capture the Flag at Def Con, owned the competition three years in a row.

Joshua Pennell
President & CEO

Theodore Ipsen
Director of Operations

Joshua Schmidt
Managing Director

Dan Kaminsky
Director Penetration Testing

Chris Paget
Director R&D

Black Hat Sustaining Sponsor: Microsoft

Microsoft is proud to be a continuing sponsor of the Black Hat Security conference. We appreciate Black Hat providing a unique forum in which security researchers from all over the world, IT Pros and industry luminaries can gather to share insights, knowledge and information to advance security research. 

Microsoft remains dedicated to software security and privacy and continues to collaborate with the community of people and technology organizations helping to protect customers and the broader ecosystem, Microsoft is also dedicated to software security and privacy.

Since the onset of Trustworthy Computing we have fostered a culture of security within Microsoft that includes developing secure code, building strong relationships with industry researchers and partners, and providing guidance to help protect customers. We would like to thank all of the customers, partners and security researchers who have worked with us to advance the state of the art in security science. Only by working together with partners, researchers and the community can we all ensure the advancement and success of the technology industry.

1997-2009 Black Hat ™