Meet SpyCloud at Black Hat 2024

We’d love to meet up during Black Hat. Let us know you’re interested in connecting and we’ll quickly follow up to schedule time with you at the show.
AUGUST 7 – 8, 2024  |  LAS VEGAS, NV
The Mandalay Bay Conference Center – Booth #4424

Don’t Play Games with Cybercriminals

Infinite ways to disrupt cybercrime

SpyCloud Event booth

We're Bringing Our Best...

Our mission, together with our customers and partners, is to make the internet a safer place by disrupting the criminal underground. Our team of experts will be at Black Hat to answer questions, meet with ecosystem partners, engage with current and future customers, and demo our latest capabilities.

Find us in the expo:

ARE YOU

UP FOR THE CHALLENGE?

Receive an exclusive SpyCloud challenge coin when you reach gold status.

BRONZE

PLAY OUR CLAW MACHINE

CHECK YOUR EXPOSURE

SILVER

Get a demo or attend a booth presentation

GOLD

Book a post-event meeting or attended another SpyCloud presentation

Attend our in-booth presentations

TIME Wednesday, August 7th Thursday, August 8th
10:30 AM C is for Cookie - The Missing Ingredient in Your Zero Trust Recipe Clearing Investigations Hurdles
11:30 AM Threat Intel Doesn't Need to SOC C is for Cookie - The Missing Ingredient in Your Zero Trust Recipe
12:30 PM Clearing Investigation Hurdles Clearing Investigation Hurdles
1:30 PM C is for Cookie - The Missing Ingredient in Your Zero Trust Recipe Threat Intel Doesn't Need to SOC
2:30 PM Threat Intel Doesn't Need to SOC C is for Cookie - The Missing Ingredient in Your Zero Trust Recipe
3:30 PM Clearing Investigation Hurdles
4:00 PM C is for Cookie - The Missing Ingredient in Your Zero Trust Recipe
4:30 PM Threat Intel Doesn't Need to SOC
5:00 PM Clearing Investigation Hurdles
5:15 PM Threat Intel Doesn't Need to SOC
5:30 PM C is for Cookie - The Missing Ingredient in Your Zero Trust Recipe
Meet with us!

Robust solutions for any use case

SpyCloud empowers security teams to take action – with dynamic insights on malware-infected devices, compromised users, and exposed applications, enterprises can proactively prevent ransomware, ATO and other targeted attacks, while efficiently remediating points of compromise.

Post-Infection Remediation

Augment malware incident response protocols to close entry points for ransomware attacks

Ransomware Prevention

Enterprise-ready protection from targeted attacks tied to malware

Automated ATO Prevention

Continuously detect and remediate compromised credentials

Session Hijacking Prevention

Prevent unauthorized access of consumer sessions and critical workforce applications

Threat Actor Attribution

Efficiently de-anonymize threat actors and tie them to their crimes

Fraud Prevention

Preserve account integrity throughout consumer digital experiences

Penetration Testing

Improve outcomes with accurate, enriched data from the criminal underground

Dark Web Monitoring

Experience the power of recaptured data to protect consumers & employees from dark web threats

Zero Trust

Accelerate Zero Trust initiatives by continuously evaluating employee identities for compromise

Let's Grab Time at the Show