Black Hat 2024

AUGUST 7-8, 2024

MANDALAY BAY CONVENTION CENTER, LAS VEGAS, NV

The Cyber Hero® Team is excited to return to Black Hat USA! ThreatLocker® is helping organizations like yours protect against known and unknown exploits with Zero Trust endpoint controls.

Current ThreatLocker® Customers: if you're interested in a discounted briefings pass, please reach out to your Account Manager

Join ThreatLocker® at Booth 1120

Check out our schedule below!

ThreatLocker® Welcome Reception
Don't gamble with your security! Join us at Black Hat for a lively Welcome Reception hosted by ThreatLocker®. Meet our Cyber Hero® Team and dive into discussions on the latest advancements in ThreatLocker® Endpoint Security. It's a great opportunity to connect and learn together!
Time: 7PM - 10PM

RSVP below and we'll send you a confirmation email with all the details.

Welcome Reception RSVP

Booth Hours: 10AM – 6PM

Join us for:

  • In-booth Threat Talks
  • Interactive Product Overviews
  • Reverse Shell and Rubber Ducky hacking techniques demonstrations
  • Pick up your ThreatLocker® Swag

Booth Hours: 10:00 AM – 4:00 PM

Ballroom J on Thursday 8/8 from 1:50-2:40PM

How to Prevent Supply Chain Attacks presented by ThreatLocker® CEO & Co-Founder Danny Jenkins - With all of the software running in an organization, do you know where all of it was made and what it can do? Whether through exploitation of a trusted application vulnerability, an embedded backdoor, or malicious script, learn how to understand and take steps to mitigate the risk of third-party software vendors.

Join us for:

  • In-booth Threat Talks With a Cyber Hero®
  • Interactive Product Overviews
  • Reverse Shell and Rubber Ducky hacking techniques demonstrations
  • Pick up your ThreatLocker® Swag

ThreatLocker® CEO and Co-Founder Danny Jenkins Presents

Portrait of Danny Jenkins

Understanding Supply Chain Risks

Mainstage Lunch Keynote - 25 minutes

WEDNESDAY, AUGUST 7 - 12:40PM OCEANSIDE A (LEVEL 2)

In complex software ecosystems, individual application risks are compounded. When it comes to mitigating supply chain risk, identifying backdoors or unintended vulnerabilities that can be exploited in your environment is just as critical as staying current with the latest hacking intel. Understand how to spot and reduce the risk to your environment and prevent disruption to your operation.

How to Create Malware

Sponsored Session - 50 minutes

THURSDAY, AUGUST 8 - 1:30PM MANDALAY BAY BALLROOM J

In a world where anyone can create successful malware or have AI generate it for them, it's important to know how malware can be successful so you can better defend. Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.

Threat Talks

Schedule & Events

Join us at Booth 1140

Wednesday, August 9

  • 10:15
    Start With Deny
  • 10:45
    Brute Force Attacks
  • 11:15
    Network Access Demo
  • 11:45
    Living Off The Land Attacks
  • 12:15
    Ringfencing Demo
  • 12:45
    Good Behavior Gone Malicious
  • 1:15
    ThreatLockerOps Demo
  • 1:45
    Data Exfiltration
  • 2:15
    Storage Control Demo
  • 2:45
    The Follina Fix
  • 3:15
    App Control Demo
  • 3:45
    Brute Force Attacks
  • 4:15
    Network Access Demo
  • 4:45
    Living Off The Land Attacks
  • 5:15
    Ringfencing Demo
  • 5:45
    Good Behavior Gone Malicious

Thursday, August 10

  • 10:15
    Start With Deny
  • 10:45
    Brute Force Attacks
  • 11:15
    Network Access Demo
  • 11:45
    Living Off The Land Attacks
  • 12:15
    Ringfencing Demo
  • 12:45
    Good Behavior Gone Malicious
  • 1:15
    ThreatLockerOps Demo
  • 1:45
    Data Exfiltration
  • 2:15
    Storage Control Demo
  • 2:45
    The Follina Fix
  • 3:15
    Hack Wild Card

In The Meantime...

Watch these webinars to learn more about the controls you can check off across some of the world’s biggest compliance frameworks. See you at Black Hat Las Vegas!

ThreatLocker Webinar: The IT Professional's Blueprint for Compliance Part 1 ThreatLocker Webinar: The IT Professional's Blueprint for Compliance Part 2

Current Job Openings

Looking to take the next step in your career? ThreatLocker® is hiring! Look through our opportunities in Engineering, Information Technology, Marketing, Sales, Support, and Talent Acquisition.

Take Control of Your
Organization's Security

Schedule a no-obligation demo with our Cyber Hero® Team.

Press Contacts

To interview ThreatLocker® CEO Danny Jenkins, please contact press@threatlocker.com.
.youtube-video-title { display: none; }