Black Hat 2024

AUGUST 7-8, 2024

MANDALAY BAY CONVENTION CENTER, LAS VEGAS, NV

The Cyber Hero® Team is excited to return to Black Hat USA! ThreatLocker® is helping organizations like yours protect against known and unknown exploits with Zero Trust endpoint controls.

Current ThreatLocker® Customers: if you're interested in a discounted briefings pass, please reach out to your Account Manager

Join ThreatLocker® at Booth 1120

Check out our schedule below!

ThreatLocker® Welcome Reception
Don't gamble with your security! Join us at Black Hat for a lively Welcome Reception hosted by ThreatLocker®. Meet our Cyber Hero® Team and dive into discussions on the latest advancements in ThreatLocker® Endpoint Security. It's a great opportunity to connect and learn together!
Time: 7PM - 10PM

RSVP below and we'll send you a confirmation email with all the details.

Welcome Reception RSVP

Booth Hours: 10AM – 6PM

Oceanside A on Wednesday 8/7 at 12:40PM

Understanding Supply Chain Risks - Mainstage Lunch Keynote presented by ThreatLocker® CEO & Co-Founder Danny Jenkins
Understand how to spot and reduce the risk to your environment and prevent disruption to your operation.

Join us for:

  • In-booth Threat Talks With a Cyber Hero®
  • Interactive Product Overviews
  • Reverse Shell and Rubber Ducky hacking techniques demonstrations
  • Pick up your ThreatLocker® Swag

Booth Hours: 10:00 AM – 4:00 PM

Ballroom J on Thursday 8/8 from 1:30-2:20PM

How to Create Malware - a sponsored session presented by ThreatLocker® CEO & Co-Founder Danny Jenkins
Learn how adopting Zero Trust principles can keep your data safeand operations running regardless of hacking attempts by man or machine.

Join us for:

  • In-booth Threat Talks With a Cyber Hero®
  • Interactive Product Overviews
  • Reverse Shell and Rubber Ducky hacking techniques demonstrations
  • Pick up your ThreatLocker® Swag

ThreatLocker® CEO and Co-Founder Danny Jenkins Presents

Portrait of Danny Jenkins

Understanding Supply Chain Risks

Mainstage Lunch Keynote - 25 minutes

WEDNESDAY, AUGUST 7 - 12:40PM OCEANSIDE A (LEVEL 2)

In complex software ecosystems, individual application risks are compounded. When it comes to mitigating supply chain risk, identifying backdoors or unintended vulnerabilities that can be exploited in your environment is just as critical as staying current with the latest hacking intel. Understand how to spot and reduce the risk to your environment and prevent disruption to your operation.

How to Create Malware

Sponsored Session - 50 minutes

THURSDAY, AUGUST 8 - 1:30PM MANDALAY BAY BALLROOM J

In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.

Threat Talks

Schedule & Events

Join us at Booth 1140

Wednesday, August 9

  • 10:15
    Start With Deny
  • 10:45
    Brute Force Attacks
  • 11:15
    Network Access Demo
  • 11:45
    Living Off The Land Attacks
  • 12:15
    Ringfencing Demo
  • 12:45
    Good Behavior Gone Malicious
  • 1:15
    ThreatLockerOps Demo
  • 1:45
    Data Exfiltration
  • 2:15
    Storage Control Demo
  • 2:45
    The Follina Fix
  • 3:15
    App Control Demo
  • 3:45
    Brute Force Attacks
  • 4:15
    Network Access Demo
  • 4:45
    Living Off The Land Attacks
  • 5:15
    Ringfencing Demo
  • 5:45
    Good Behavior Gone Malicious

Thursday, August 10

  • 10:15
    Start With Deny
  • 10:45
    Brute Force Attacks
  • 11:15
    Network Access Demo
  • 11:45
    Living Off The Land Attacks
  • 12:15
    Ringfencing Demo
  • 12:45
    Good Behavior Gone Malicious
  • 1:15
    ThreatLockerOps Demo
  • 1:45
    Data Exfiltration
  • 2:15
    Storage Control Demo
  • 2:45
    The Follina Fix
  • 3:15
    Hack Wild Card

In Case You Missed These Sessions...

Register for our upcoming webinar to watch a live supply chain cyberattack demo and learn what it takes to protect your organization from these threats!

ThreatLocker Webinar: Preventing Supply Chain Attacks

Current Job Openings

Looking to take the next step in your career? ThreatLocker® is hiring! Look through our opportunities in Engineering, Information Technology, Marketing, Sales, Support, and Talent Acquisition.

Take Control of Your
Organization's Security

Schedule a no-obligation demo with our Cyber Hero® Team.

Press Contacts

To schedule media interviews, please contact press@threatlocker.com.