Registration and Call for Papers Now Open for Black Hat USA 2014Registration and Call for Papers Now Open for Black Hat USA 2014
Prestigious Security Event to Offer Two Free Student Passes for Every Briefing Chosen
February 19, 2014
PR Newswire -- February 18, 2014
SAN FRANCISCO, Feb. 18, 2014 /PRNewswire/ -- Today, Black Hat, the world's leading family of information security events, opens Registration and Call for Papers (CFP) for Black Hat USA 2014. [Tweet This] Returning to Las Vegas for the 17th year, Black Hat will continue to celebrate the very latest in information security research, development and trends. This year's show will run August 2-7 at the Mandalay Bay Convention Center.
What's new this year?
Registration is now open. Be sure to take advantage of early registration prices by June 2, 2014.
Call for Papers is now open. Black Hat is seeking groundbreaking vendor-neutral research for this year's Briefings, the heart and soul of each annual show. The deadline for submissions is April 4, 2014.
Giving Back: Black Hat has always been driven by the needs of the security community - from the up-and-coming academics to the distinguished researchers, industry enthusiasts, InfoSec execs and everyone in between. Continuing this history, we're pleased to announce that for every Briefing accepted for Black Hat USA 2014, we will provide two student passes, including full access to Black Hat USA's Briefings free of charge, for that session's speakers to distribute to qualified students.
Read more about the happenings of Black Hat USA 2014 in the latest Intel Post.
To register or get your submission started, please visit: http://blackhat.com/us-14/.
Sponsors of Black Hat USA 2014 include Diamond Sponsors: Microsoft, Qualys and RSA; Platinum Plus Sponsors: Blue Coat Systems, Cisco, FireEye, Juniper Networks and Lieberman Software; Platinum Sponsors: Accuvant LABS, AlienVault, Core Security Technology, LogRhythm, Tenable Network Security and IBM.
About Black Hat For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends. These high-profile global events and trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors. Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, and are produced by UBM Tech. More information is available at: http://www.blackhat.com.
About UBM Tech UBM Tech is a global media business that brings together the world's technology communities through live events, online properties and custom services. UBM Tech's community-focused approach provides its users and clients with expertly curated research, education, training, community advocacy, user-generated content and peer-to-peer engagement opportunities that serve the Electronics, Security, Enterprise IT and Communications, Network Infrastructure and Applications, Game and App Developers, and Tech Marketing communities. UBM Tech's brands include Black Hat, DesignCon, EE Times, Enterprise Connect, Game Developers Conference (GDC), HDI, InformationWeek, and Interop. Create, a UBM Tech full range marketing services division, includes custom events, content marketing solutions, community development and demand generation programs based on its content and technology market expertise. UBM Tech is a part of UBM (UBM.L), a global provider of media and information services with a market capitalization of more than $2.5 billion. For more information, go to http://tech.ubm.com.
SOURCE Black Hat
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
The State of Supply Chain Threats
How to Deploy Zero Trust for Remote Workforce Security
How to Use Threat Intelligence to Mitigate Third-Party Risk
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment