Black Hat Briefings

Last updated
Black Hat Briefings
StatusActive
GenreSecurity Conference
FrequencyAnnual
VenueVaries
Location(s)United States, United Kingdom, Singapore
Years active26
InauguratedJuly 9, 1997 (1997-07-09)
Founder Jeff Moss
Organised byInforma Tech
Website blackhat.com

Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together a variety of people interested in information security ranging from non-technical individuals, executives, hackers, and security professionals. The conference takes place regularly in Las Vegas, Barcelona, London and Riyadh. The conference has also been hosted in Amsterdam, Tokyo, and Washington, D.C. in the past. [1] [2]

Contents

History

The first Black Hat was held July 7-10, 1997 in Las Vegas, immediately prior to DEF CON 5. [3] The conference was aimed at the computer industry, promising to give them privileged insight into the minds and motivations of their hacker adversaries. Its organizers stated: "While many conferences focus on information and network security, only the Black Hat Briefings will put your engineers and software programmers face-to-face with today's cutting edge computer security experts and 'hackers.'" [4] It was presented by DEF CON Communications and Cambridge Technology Partners. It was founded by Jeff Moss, who also founded DEF CON, and is currently the Conference Chair of the Black Hat Review Board. [5] These are considered[ by whom? ] the premier information security conferences in the world. Black Hat started as a single annual conference in Las Vegas, Nevada and is now held in multiple locations around the world. [6] Black Hat Briefings was acquired by CMP Media, a subsidiary of U.K.-based United Business Media (UBM) in 2005 [7] [8] which was then acquired by Informa Tech in June 2018.

Culture

Black Hat is typically scheduled prior to DEF CON with many attendees going to both conferences. It has been perceived by the security industry as a more corporate security conference whereas DEF CON is more informal.

Components

The conference is composed of three major sections: the Black Hat Briefings, Black Hat Trainings, and Black Hat Arsenal.

Briefings

The Briefings are composed of tracks, covering various topics including reverse engineering, identity and privacy, and hacking. The briefings also contain keynote speeches from leading voices in the information security field, including Robert Lentz, Chief Security Officer, United States Department of Defense; Michael Lynn; Amit Yoran, former Director of the National Cyber Security Division of the Department of Homeland Security; [2] [9] and General Keith B. Alexander, former Director of the National Security Agency and former commander of the United States Cyber Command. [10]

Trainings

Training is offered by various computer security vendors and individual security professionals. The conference has hosted the National Security Agency's information assurance manager course, and various courses by Cisco Systems, Offensive Security, [11] and others. [12] [13]

Arsenal

Arsenal is a portion of the conference dedicated to giving researchers and the open source community a place to showcase their latest open-source information security tools. Arsenal primarily consists of live tool demonstrations in a setting where attendees can ask questions about the tools and sometimes use them. It was added in 2010. [14] ToolsWatch maintains an archive of all Black Hat Briefings Arsenals. [15]

Notable incidents

Michael Lynn presenting a briefing in 2005 Michael Lynn Black Hat Briefing Las Vegas 2005.jpg
Michael Lynn presenting a briefing in 2005

Black Hat had historically been known for the antics of its hacker contingent, and the disclosures brought in its talks. In the past, companies have attempted to ban researchers from disclosing vital information about their products. At Black Hat USA in 2005, Cisco Systems tried to stop Michael Lynn from speaking about a vulnerability that he said could let hackers virtually shut down the Internet. [2] However, in recent years, researchers have worked with vendors to resolve issues, and some vendors have challenged hackers to attack their products. [16] [17] [18] [19]

Conference attendees had been known to hijack wireless connections of the hotels, hack hotel television billing systems, and in one instance, deploy a fake automated teller machine in a hotel lobby. [20] In 2009, web sites belonging to a handful of security researchers and groups were hacked and passwords, private e-mails, instant messaging chats, and sensitive documents were exposed on the vandalized site of Dan Kaminsky, days before the conference. During Black Hat USA in 2009, a USB thumb drive that was passed around among attendees was found to be infected with the Conficker virus, and in 2008, three men were expelled for packet sniffing the press room local area network. [21]

Venues, dates, and locations

Black Hat had initially started within the United States but expanded over the years across USA, Europe, Asia, Middle East, Africa, Washington DC, and Abu Dhabi: [22]

Conference NameLocationVenueDurationYear
Black Hat Asia 2024 [23] SingaporeMarina Bay SandsApril 16 - April 192024
Black Hat Spring Trainings 2024 [24] United States, Washington DCWalter E Washington Convention CenterMarch 12 - March 152024
Black Hat Europe 2023 [25] United Kingdom, LondonExcel LondonDecember 4 - December 72023
Black Hat USA 2023 [26] United States, Las Vegas, VirtualMandalay BayAugust 5 - August 102023
Black Hat Asia 2023 [27] Singapore, VirtualMarina Bay SandsMay 9 - May 122023
Black Hat Spring Trainings 2023 [28] VirtualN/AMarch 13 - March 162023
Black Hat Europe 2022 [29] United Kingdom, LondonExcel LondonDecember 5 - December 82022
Black Hat USA 2022 [30] United States, Las Vegas, VirtualMandalay BayAugust 6 - August 112022
Black Hat Spring Trainings 2022 [31] VirtualN/AJune 13 - June 162022
Black Hat Asia 2022 [32] Singapore, VirtualMarina Bay SandsMay 10 - May 132022
Black Hat Europe 2021 [33] United Kingdom, LondonExcel LondonNovember 8 - November 112021
Black Hat USA 2021 [34] United States, Las Vegas, VirtualMandalay BayJuly 31 - August 52021
Black Hat Asia 2021 [35] VirtualN/AMay 4 - May 72021
Black Hat Spring Trainings 2021 [36] VirtualN/AMarch 15 - March 182021
Black Hat Europe 2020 [37] VirtualN/ADecember 7 - December 102020
Black Hat Asia 2020 [38] VirtualN/ASeptember 29 - October 22020
Black Hat USA 2020 [39] VirtualN/AAugust 1 - August 62020
Black Hat Europe 2019 [40] United Kingdom, LondonExcel LondonDecember 2 - December 52019
Black Hat Trainings 2019 [41] United States, AlexandriaHilton AlexandriaOctober 17 - October 182019
Black Hat USA 2019 [42] United States, Las VegasMandalay BayAugust 3 - August 82019
Black Hat Asia 2019 [43] SingaporeMarina Bay SandsMarch 26 - March 292019
Black Hat Europe 2018 [44] United Kingdom, LondonExcel LondonDecember 3 - December 62018
Black Hat Trainings 2018 [45] United States, ChicagoSheraton Grand ChicagoOctober 22 - October 232018
Black Hat USA 2018 [46] United States, Las VegasMandalay BayAugust 4 - August 92018
Black Hat Asia 2018 [47] SingaporeMarina Bay SandsMarch 20 - March 232018
Black Hat Europe 2017 [48] United Kingdom, LondonExcel LondonDecember 4 - December 72017
Black Hat USA 2017 [49] United States, Las VegasMandalay BayJuly 22 - July 272017
Black Hat Asia 2017 [50] SingaporeMarina Bay SandsMarch 28 - March 312017
Black Hat Europe 2016 [51] United Kingdom, LondonBusiness Design CentreNovember 1 - November 42016
Black Hat USA 2016 [52] United States, Las VegasMandalay BayJuly 3 - August 42016
Black Hat Asia 2016 [53] SingaporeMarina Bay SandsMarch 29 - April 12016
Black Hat Europe 2015 [54] Netherlands, AmsterdamAmsterdam RAINovember 10 - November 132015
Black Hat USA 2015 [55] United States, Las VegasMandalay BayAugust 1 - August 62015
Black Hat Asia 2015 [56] SingaporeMarina Bay SandsMarch 24 - March 272015
Black Hat Trainings 2014 [57] United States, PotomocThe Bolger CenterDecember 8 - December 112014
Black Hat Europe 2014 [58] Netherlands, AmsterdamAmsterdam RAIOctober 14 - October 172014
Black Hat USA 2014 [59] United States, Las VegasMandalay BayAugust 2 - August 72014
Black Hat Asia 2014 [60] SingaporeMarina Bay SandsMarch 25 - March 282014
Black Hat USA 2013 [61] United States, Las VegasCaesars PalaceJuly 27 - August 12013
Black Hat Europe 2013 [62] Netherlands, AmsterdamGrand Hotel KrasnapolskyMarch 12 - March 152013
Black Hat USA 2012 [63] United States, Las VegasCaesars PalaceJuly 21 - July 262012
Black Hat Europe 2012 [64] Netherlands, AmsterdamGrand KrasnapolskyMarch 14 - March 162012
Black Hat USA 2011 [65] United States, Las VegasCaesars PalaceJuly 30 - August 22011
Black Hat DC 2011 [66] United States, Crystal CityHyatt RegencyJanuary 16 - January 192011
Black Hat USA 2010 [67] United States, Las VegasCaesars PalaceJuly 24 - July 292010
Black Hat DC 2010 [68] United States, Crystal CityHyatt RegencyJanuary 31 - February 32010
Black Hat USA 2009 [69] United States, Las VegasCaesars PalaceJuly 25 - July 302009
Black Hat DC 2009 [70] United States, Crystal CityHyatt RegencyFebruary 16 - February 172009
Black Hat USA 2008 [71] United States, Las VegasCaesars PalaceAugust 2 - August 72008
Black Hat DC 2008 [72] United States, Crystal CityWestin Washington DC City CenterFebruary 18 - February 212008
Black Hat USA 2007 [73] United States, Las VegasCaesars PalaceJuly 28 - August 22007
Black Hat USA 2006 [74] United States, Las VegasCaesars PalaceJuly 29 - August 32006
Black Hat Federal 2006 [75] United States, Crystal CitySheraton Crystal CityJanuary 23 - January 262006
Black Hat USA 2005 [76] United States, Las VegasCaesars PalaceJuly 23 - July 282005
Black Hat USA 2004 [77] United States, Las VegasCaesars PalaceJuly 24 - July 292004
Black Hat Federal 2003 [78] United States, Tysons CornerSheraton PremiereSeptember 29 - October 22003
Black Hat USA 2003 [79] United States, Las VegasCaesars PalaceJuly 28 - July 312003
Black Hat USA 2002 [80] United States, Las VegasCaesars PalaceJuly 29 - August 12002
The Black Hat Briefings '01 [81] United States, Las VegasCaesars PalaceJuly 11 - July 122001
The Black Hat Briefings '00 [82] United States, Las VegasCaesars PalaceJuly 26 - July 272000
The Black Hat Briefings '99 [83] United States, Las VegasThe VenetianJuly 7 - July 81999
The Black Hat Briefings '98 [84] United States, Las VegasCaesars PalaceJuly 29 - July 301998
The Black Hat Briefings [85] United States, Las VegasUnknownJuly 9 - July 101997

See also

Related Research Articles

DEF CON is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions. Contests held during the event are extremely varied and can range from creating the longest Wi-Fi connection to finding the most effective way to cool a beer in the Nevada heat.

A white hat is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabilities or security issues the current system has. The white hat is contrasted with the black hat, a malicious hacker; this definitional dichotomy comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat, respectively. There is a third kind of hacker known as a grey hat who hacks with good intentions but at times without permission.

A grey hat is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker.

<span class="mw-page-title-main">Gordon Lyon</span> American network security expert (born 1977

Gordon Lyon is an American network security expert, creator of Nmap and author of books, websites, and technical papers about network security. He is a founding member of the Honeynet Project and was Vice President of Computer Professionals for Social Responsibility.

Summercon is one of the oldest hacker conventions, and America's oldest and longest-running information security conference. It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON, although it has remained smaller and more personal. Summercon has been hosted in cities such as Pittsburgh, St. Louis, Atlanta, Washington, D.C., New York City, Austin, Las Vegas, and Amsterdam. Originally run by Phrack, the underground ezine, and held annually in St. Louis, the organizational responsibilities of running Summercon were transferred to clovis in 1998 and the convention took place in Atlanta, dubbed 'Summercon X'.

Black hat, blackhats, or black-hat refers to:

Blue Pill is the codename for a rootkit based on x86 virtualization. Blue Pill originally required AMD-V (Pacifica) virtualization support, but was later ported to support Intel VT-x (Vanderpool) as well. It was designed by Joanna Rutkowska and originally demonstrated at the Black Hat Briefings on August 3, 2006, with a reference implementation for the Microsoft Windows Vista kernel.

<span class="mw-page-title-main">Jeff Moss (hacker)</span> American computer security expert

Jeff Moss, also known as Dark Tangent, is an American hacker, computer and internet security expert who founded the Black Hat and DEF CON computer security conferences.

Johnny Long, otherwise known as "j0hnny" or "j0hnnyhax", is a computer security expert, author, and public speaker in the United States.

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.

<span class="mw-page-title-main">Elie Bursztein</span> French computer scientist (born 1980)

Elie Bursztein, born 1 June 1980 in France, is a French computer scientist and software engineer. He currently Google and DeepMind AI cybersecurity technical and research lead.

In computer security, virtual machine escape is the process of a program breaking out of the virtual machine on which it is running and interacting with the host operating system. A virtual machine is a "completely isolated guest operating system installation within a normal host operating system". In 2008, a vulnerability in VMware discovered by Core Security Technologies made VM escape possible on VMware Workstation 6.0.2 and 5.5.4. A fully working exploit labeled Cloudburst was developed by Immunity Inc. for Immunity CANVAS. Cloudburst was presented in Black Hat USA 2009.

<span class="mw-page-title-main">Matt Suiche</span>

Matthieu Suiche, also known as Matt and under the username msuiche, is a French hacker and entrepreneur widely known as the founder of MoonSols, and co-founder of CloudVolumes before it was acquired by VMWare in 2014. In March 2014, Suiche was highlighted as one of the 100 key French developers in a report for French minister Fleur Pellerin.

<span class="mw-page-title-main">Juice jacking</span> Mobile security risk

Juice jacking is a theoretical type of compromise of devices like smartphones and tablets which use the same cable for charging and data transfer, typically a USB cable. The goal of the attack is to either install malware on the device, or to surreptitiously copy potentially sensitive data. As of April 2023 there have been no credible reported cases of juice jacking outside of research efforts.

Offensive Security is an American international company working in information security, penetration testing and digital forensics. Operating from around 2007, the company created open source projects, advanced security courses, the ExploitDB vulnerability database, and the Kali Linux distribution. The company was started by Mati Aharoni, and employs security professionals with experience in security penetration testing and system security evaluation. The company has provided security counseling and training to many technology companies.

<span class="mw-page-title-main">Iftach Ian Amit</span> Israeli Hacker

Iftach Ian Amit is an Israeli Hacker/computer security researcher and practitioner. He is one of the co-founders of the Tel Aviv DEF CON Group DC9723, the Penetration Testing Execution Standard, and presented at hacker conventions such as DEF CON, Black Hat, BlueHat, RSA Conference. He has been named SC Magazine's top experts and featured at Narratively's cover piece on Attack of the Superhackers and is frequently quoted and interviewed

Security BSides is a series of loosely affiliated information security conferences. It was co-founded by Mike Dahn, Jack Daniel, and Chris Nickerson in 2009. Due to an overwhelming number of presentation submissions to Black Hat USA in 2009, the rejected presentations were presented to a smaller group of individuals. Over time the conference format matured and was released to enable individuals to start their own BSides conferences. The Las Vegas BSides conference is also considered part of Hacker Summer Camp given its schedule and proximity to other security conferences during that time.

<span class="mw-page-title-main">HackRF One</span> SDR half-duplex transceiver

HackRF One is a wide band software defined radio (SDR) half-duplex transceiver created and manufactured by Great Scott Gadgets. It is able to send and receive signals. Its principal designer, Michael Ossmann, launched a successful Kickstarter campaign in 2014 with a first run of the project called HackRF. The hardware and software's open source nature has attracted hackers, amateur radio enthusiasts, and information security practitioners.

Election cybersecurity or election security refers to the protection of elections and voting infrastructure from cyberattack or cyber threat – including the tampering with or infiltration of voting machines and equipment, election office networks and practices, and voter registration databases.

<span class="mw-page-title-main">Ang Cui</span> American computer scientist

Ang Cui is an American cybersecurity researcher and entrepreneur. He is the founder and CEO of Red Balloon Security in New York City, a cybersecurity firm that develops new technologies to defend embedded systems against exploitation.

References

  1. "Black Hat". blackhat.com.
  2. 1 2 3 "Computer Security Conferences Attract Both Hackers, Anti-Hackers". Fox News. 4 August 2006. Archived from the original on 30 July 2013. Retrieved 15 August 2009.
  3. Lange, Larry (July 15, 1997). "Microsoft Opens Dialogue With NT Hackers". EE Times. CMP Media Inc. Retrieved January 28, 2024.
  4. "The Black Hat Briefings USA 1997 Information".
  5. "Black Hat". blackhat.com.
  6. "Black Hat ® About Black Hat". blackhat.com.
  7. "UBM news releases". Media. Archived from the original on 2016-12-20. Retrieved 2016-11-03.
  8. "CMP Media Buys Black Hat" . Retrieved 2016-11-03.
  9. "Error". Archived from the original on 2009-02-11. Retrieved 2009-08-15.
  10. "Commander of U.S. Cyber Command and National Security Agency Director, General Keith Alexander, To Keynote Day One of Black Hat USA 2013" (Press release). WWBT-TV NBC 12, WorldNow (Gannaway). May 14, 2013. Archived from the original on June 15, 2013. Retrieved June 13, 2013.
  11. "Announcing the Kali Linux Dojo". Offensive Security. May 28, 2014. Retrieved April 15, 2019.
  12. "Black Hat ® DC 2009 Training Index". blackhat.com.
  13. "Black Hat ® Europe 2009 Training Index". blackhat.com.
  14. "Black Hat Technical Security Conference: USA 2010 // Black Hat Arsenal: Call for Tools". blackhat.com.
  15. "ToolsWatch.org – The Hackers Arsenal Tools Portal » Arsenal". www.toolswatch.org. Retrieved 2016-11-03.
  16. "Security Expert: PC Media Players Full of Holes". Fox News. 3 August 2007. Archived from the original on 6 December 2010. Retrieved 15 August 2009.
  17. "Microsoft Dares Security Experts to Find Holes in Windows Vista". Fox News. 4 August 2006. Archived from the original on 30 July 2013. Retrieved 15 August 2009.
  18. "Microsoft Challenges Hackers On Vista". CBS News. 3 August 2006.
  19. "Hackers expose weakness in trusted sites - Technology & science - Security". NBC News . Associated Press. 2 August 2009. Retrieved 2014-10-09.
  20. Zetter, Kim. "Researcher Demonstrates ATM 'Jackpotting' at Black Hat Conference". Wired. ISSN   1059-1028 . Retrieved 2024-01-28.
  21. "Hanging with hackers can make you paranoid". CNN. 4 August 2009. Archived from the original on January 22, 2015.
  22. "Black Hat Archives". blackhat.com. Retrieved 2024-01-29.
  23. "Black Hat". www.blackhat.com. Retrieved 2024-01-29.
  24. "Black Hat". www.blackhat.com. Retrieved 2024-01-29.
  25. "Black Hat". www.blackhat.com. Retrieved 2024-01-29.
  26. "Black Hat". www.blackhat.com. Retrieved 2024-01-28.
  27. "Black Hat". www.blackhat.com. Retrieved 2024-01-28.
  28. "Black Hat". www.blackhat.com. Retrieved 2024-01-29.
  29. "Black Hat". www.blackhat.com. Retrieved 2024-01-28.
  30. "Black Hat". www.blackhat.com. Retrieved 2024-01-28.
  31. "Black Hat". www.blackhat.com. Retrieved 2024-01-29.
  32. "Black Hat". www.blackhat.com. Retrieved 2024-01-28.
  33. "Black Hat". www.blackhat.com. Retrieved 2024-01-28.
  34. "Black Hat". www.blackhat.com. Retrieved 2024-01-28.
  35. "Black Hat". www.blackhat.com. Retrieved 2024-01-28.
  36. "Black Hat". www.blackhat.com. Retrieved 2024-01-29.
  37. "Black Hat". www.blackhat.com. Retrieved 2024-01-28.
  38. "Black Hat Asia 2020". www.blackhat.com. Retrieved 2024-01-28.
  39. "Black Hat USA 2020". www.blackhat.com. Retrieved 2024-01-28.
  40. "Black Hat Europe 2019". www.blackhat.com. Retrieved 2024-01-28.
  41. "Black Hat Trainings 2019". www.blackhat.com. Retrieved 2024-01-29.
  42. "Black Hat USA 2019". www.blackhat.com. Retrieved 2024-01-28.
  43. "Black Hat Asia 2019". www.blackhat.com. Retrieved 2024-01-28.
  44. "Black Hat Europe 2018". www.blackhat.com. Retrieved 2024-01-28.
  45. "Black Hat Trainings 2018". www.blackhat.com. Retrieved 2024-01-29.
  46. "Black Hat USA 2018". www.blackhat.com. Retrieved 2024-01-28.
  47. "Black Hat Asia 2018". www.blackhat.com. Retrieved 2024-01-28.
  48. "Black Hat Europe 2017". www.blackhat.com. Retrieved 2024-01-28.
  49. "Black Hat USA 2017". www.blackhat.com. Retrieved 2024-01-28.
  50. "Black Hat Asia 2017". www.blackhat.com. Retrieved 2024-01-28.
  51. "Black Hat Europe 2016". www.blackhat.com. Retrieved 2024-01-28.
  52. "Black Hat USA 2016". www.blackhat.com. Retrieved 2024-01-28.
  53. "Black Hat Asia 2016". www.blackhat.com. Retrieved 2024-01-28.
  54. "Black Hat Europe 2015". www.blackhat.com. Retrieved 2024-01-28.
  55. "Black Hat USA 2015". www.blackhat.com. Retrieved 2024-01-28.
  56. "Black Hat Asia 2015". www.blackhat.com. Retrieved 2024-01-28.
  57. "Black Hat Trainings 2014". www.blackhat.com. Retrieved 2024-01-29.
  58. "Black Hat Europe 2014". www.blackhat.com. Retrieved 2024-01-28.
  59. "Black Hat USA 2014". www.blackhat.com. Retrieved 2024-01-28.
  60. "Black Hat Asia 2014". www.blackhat.com. Retrieved 2024-01-28.
  61. "Black Hat USA 2013". www.blackhat.com. Retrieved 2024-01-28.
  62. "Black Hat Europe 2013". www.blackhat.com. Retrieved 2024-01-28.
  63. "Black Hat USA 2012". www.blackhat.com. Retrieved 2024-01-29.
  64. "Black Hat ® Technical Security Conference: Europe 2012 // Home". www.blackhat.com. Retrieved 2024-01-29.
  65. "Black Hat ® Technical Security Conference: USA 2011 // Home". www.blackhat.com. Retrieved 2024-01-29.
  66. "Black Hat ® Technical Security Conference: DC 2011 // Archives". www.blackhat.com. Retrieved 2024-01-29.
  67. "Black Hat ® Technical Security Conference: USA 2010 // Home". www.blackhat.com. Retrieved 2024-01-29.
  68. "Black Hat ® Technical Security Conference: DC 2010 // Archives". www.blackhat.com. Retrieved 2024-01-29.
  69. "Black Hat ® Technical Security Conference: USA 2009 // Home". www.blackhat.com. Retrieved 2024-01-29.
  70. "Black Hat ® DC 2009 Briefings Archives". www.blackhat.com. Retrieved 2024-01-29.
  71. "Black Hat : Upcoming : Black Hat USA 2008 Main Page". www.blackhat.com. Retrieved 2024-01-29.
  72. "Black Hat : DC 2008 Briefings". www.blackhat.com. Retrieved 2024-01-29.
  73. "Black Hat USA 2007 Briefings & Training". www.blackhat.com. Retrieved 2024-01-29.
  74. "Black Hat USA 2006 Briefings & Training". www.blackhat.com. Retrieved 2024-01-29.
  75. "Black Hat Federal 2006 Briefings & Training". www.blackhat.com. Retrieved 2024-01-29.
  76. "Black Hat USA 2005 Briefings & Training". www.blackhat.com. Retrieved 2024-01-29.
  77. "Black Hat USA 2004 Briefings & Training". www.blackhat.com. Retrieved 2024-01-29.
  78. "Black Hat Federal 2003 Briefings and Training". www.blackhat.com. Retrieved 2024-01-29.
  79. "Black Hat USA 2003 Topics and Speakers". www.blackhat.com. Retrieved 2024-01-29.
  80. "Black Hat USA 2002 Briefings and Training". www.blackhat.com. Retrieved 2024-01-29.
  81. "The Black Hat Windows 2001 Security Conference '01 in Las Vegas". www.blackhat.com. Retrieved 2024-01-29.
  82. "The Black Hat Briefings '00! in Las Vegas". www.blackhat.com. Retrieved 2024-01-29.
  83. "The Black Hat Briefings '99". www.blackhat.com. Retrieved 2024-01-29.
  84. "The Black Hat Briefings Conference Main Index". www.blackhat.com. Retrieved 2024-01-29.
  85. "The Black Hat Briefings USA 1997 Home Page". www.blackhat.com. Retrieved 2024-01-29.