2:00pm - 3:00pm EDT
AI can help anyone write a polished abstract, so what makes a proposal rise to the top? In this session, Sherri Davidoff shares practical strategies for getting talks accepted, based on her personal experience as a frequent speaker, trainer, and experienced reviewer of conference proposals.
Important note: Sherri is speaking solely from her own experience and observations, and not on behalf of Black Hat or any conference or organization. You’ll learn how to choose a compelling topic, demonstrate real expertise, tailor your proposal to the audience, and write an abstract and outline that show depth, not fluff. We’ll also cover ethical ways to use AI tools without sounding generic, plus common mistakes that lead to quick rejection (like salesy vendor pitches or vague claims). Harness AI as a tool to elevate your idea, not replace it.
2:00pm - 2:30pm EST
Claude Opus 4.6 is generating serious buzz for one reason: it can rapidly spot zero-day vulnerabilities out of the box, suggesting that long-trusted software may no longer be as “safe by default” as security teams assume. At the same time, Microsoft’s February patch cycle included an unusually high number of zero-days already under active exploitation — real-world evidence that the race is already accelerating, and the window between discovery and impact is shrinking. In this Cyberside Chats Live, we’ll connect the dots on what this means for defenders in 2026: a shrinking window between discovery and exploitation, shifting assumptions about “well-tested” software, and practical ways to rethink patch prioritization, detection, and exposure management.
2:00pm - 3:00pm EST
By 2026, cybersecurity risk is driven less by what organizations fail to patch and more by what they trust by default. AI is embedded into daily operations, SaaS platforms are deeply integrated, and identity persists long after authentication. Attackers are adapting by exploiting legitimate access paths and normal business behavior rather than relying on novel exploits. These trends describe the operating environment security leaders will be managing in 2026 and where existing controls are most likely to fall out of alignment.
2:00pm - 2:30pm EST
The recent Verizon outage underscores a growing risk in today’s technology landscape: when critical services are concentrated among a small number of providers, failures don’t stay isolated.
In this live discussion, we’ll connect the Verizon outage to past telecom and cloud disruptions to examine how infrastructure dependency creates cascading business impact. We’ll also explore how large-scale outages intersect with security threats targeting telecommunications, where availability, confidentiality, and integrity failures increasingly overlap.
The session will close with actionable takeaways for strengthening resilience and risk planning across cybersecurity and IT programs.
2:00pm - 2:30pm EST
In this episode, Sherri and Matt break down the #1 change every security program needs in 2026: dramatically improving identity and authentication across the organization. We explore how AI blurred the lines between legitimate and malicious communication, why authentication can no longer stop at the login screen, and where organizations must start adding verification into everyday workflows — from IT support calls to executive requests and financial approvals. If you want to strengthen your security program for the year ahead, this is the episode to watch.
2:00pm - 2:30pm EST
From routers to office cameras to employee phones and even the servers running your network, Chinese-manufactured components are everywhere — including throughout your own organization. In this live Cyberside Chats, we’ll explore how deeply these devices are embedded in modern infrastructure and what that means for cybersecurity, procurement, and third-party risk. Join us live for a 25-minute deep dive plus Q&A — and find out whether your supply chain is truly secure… or “Made in China — and Hacked Everywhere.”
2:00pm - 2:30pm EDT
2:00pm - 2:30pm EDT
What happens when the same AI tools that make coding easier also give cybercriminals new powers? In this episode of Cyberside Chats, we explore the rise of “vibe coding” and its darker twin, “vibe hacking.” You’ll learn how AI is reshaping software development, how attackers are turning those vibes into cybercrime, and what it means for the future of security.
2:00pm - 2:30pm EDT
They thought they were untouchable — until the hacks came for them. In the shadowy world of cybercrime, rival gangs, rogue insiders, and even nation-state spies turn their skills on each other in brutal takedowns. In this live Cyberside Chat, we’ll unpack the wildest recent cases of hacker-on-hacker warfare — and reveal the lessons every defender can learn from the downfall of the world’s most dangerous attackers.
2:00pm - 2:30pm EDT
2:00pm - 2:30pm EDT
2:00pm - 2:30pm EDT
How do hackers really get in? Tom Pohl, head of penetration testing at LMG Security, will share how his team gains full control of networks in over 90% of tests—and the misconfigurations and insecure defaults that make it possible.
2:00pm - 2:30pm EDT
Quantum computing is coming fast—are your defenses ready? Join us live for Cyberside Chats as we explore how quantum tech could upend today’s encryption and what security leaders should do now to prepare. Cut through the hype and get practical next steps. Join us for an exciting live event where you can ask questions, and gain valuable knowledge about how to prepare for Quantum computing!
2:00pm - 2:30pm EDT
In this episode of Cyberside Chats, we break down Apple’s fight against the UK’s demands, the global backlash, and what it means for cybersecurity professionals. Join us as we explore real-world risks, historical backdoor failures, and what IT leaders should watch for in evolving encryption policies. Don’t miss this deep dive into one of the biggest security battles of 2025!
11:00am - 7:00pm EST
Find your weaknesses before the hackers do! In order to effectively defend your IT infrastructure, you need to explore your network in the same way as hackers. This practical, hands-on class will teach you to do just that: pentest your own network. Along the way, we’ll cover detailed remediation tips, and test out various techniques for stopping attackers and ensuring that your changes work. Learn to hack your own network—and fix the issues—in this practical penetration testing class for IT professionals.
2:00pm - 2:30pm EST
Join us for an exciting live event where we dive into today’s hottest cybersecurity topics and share expert insights to help you stay ahead of emerging threats. This interactive session will cover the latest trends, challenges, and strategies in cybersecurity, with practical advice from industry leaders.
Don’t miss this chance to ask questions, gain valuable knowledge, and connect with experts in the field!
2:00pm - 3:00pm EST
Brace for impact! New technologies are rapidly changing cybercrime, leading to a surge in cyberattacks. Defenders need to ramp up quickly. Learn about the top cyber threats and ways that you can protect your organization in 2025.
2:00pm - 3:00pm EST
In this quick, high-impact session, we’ll dive into the top three cybersecurity priorities every leader should focus on. From integrating AI into your defenses to tackling deepfake threats and tightening third-party risk management, this discussion will arm you with the insights you need to stay secure in the year ahead.
11:00am - 7:00pm EST
Cybersecurity first responders need to react quickly to identify data breaches and minimize potential losses. Learn how to respond to malware, cloud breaches, network intrusions & more in this intensive one-day bootcamp. Bring your caffeine and be ready!
2:00pm - 3:00pm EDT
Artificial intelligence has opened new doors for scammers, giving rise to sophisticated threats like deepfakes and voice cloning. Today’s cyberattacks now leverage AI to infiltrate organizations through voice and video manipulation, making it harder than ever to distinguish real from fake. Join us for a dynamic, interactive session where you’ll discover the latest trends in cyberattacks and gain practical strategies to defend your organization. This session will equip your team with the knowledge and tools necessary to stay ahead of AI-powered threats and reduce your organization’s risk.