Sponsored By

Best of Black Hat: 20 Epic Talks in 20 Years

In celebration of Black Hat's 20th birthday, we take a look back at the most memorable presentations and demos since the show's inception in 1997.

Kelly Sheridan

July 19, 2017

21 Slides

This year marks the 20th anniversary of Black Hat, the information security conference founded by Jeff Moss in 1997. What began as a single meetup in Las Vegas has expanded around the world to host events in the United States, Europe, and Asia.

Over the years, Black Hat has brought together CISOs, researchers, academics, IT specialists, analysts, federal employees, cryptographers, and many other security professionals to learn about, and discuss, the threats and trends shaping their industry.

Much of the learning takes place in the Black Hat Briefings, which were created to give security pros a place to discover new threats and developments that could potentially put them at risk. Each year, researchers take the conference stage to share their latest work and exploits.

Twenty years is a long time in an industry where threats change by the minute. The many vulnerabilities exposed at Black Hat have affected everything from consumer devices to critical infrastructure.

For example, anyone who was at Black Hat 2010 recalls when the late Barnaby Jack, then director of research at IOActive, demonstrated how a cybercriminal could compromise an ATM and steal cash, copy customers' card data, or learn the machines' master passwords.

Information released at Black Hat has proven groundbreaking and game-changing for those in attendance. Here, we take a look back at the "best of" Black Hat talks, discoveries, and moments over the past 20 years.

Do you have a favorite Black Hat moment that didn't make this list? If so, we'd love to hear about it! Feel free to share your thoughts in the comments.  

Read more about:

Black Hat News

About the Author(s)

Kelly Sheridan

Senior Editor

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial services. Sheridan earned her BA in English at Villanova University. You can follow her on Twitter @kellymsheridan.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights