{"id":324902,"date":"2024-07-17T08:00:25","date_gmt":"2024-07-17T15:00:25","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=324902"},"modified":"2024-07-18T12:56:31","modified_gmt":"2024-07-18T19:56:31","slug":"proud-diamond-sponsor-at-black-hat-usa","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2024\/07\/proud-diamond-sponsor-at-black-hat-usa\/","title":{"rendered":"Proud Diamond Sponsor at Black Hat USA"},"content":{"rendered":"<h3>Experience Precision AI\u2122 technology in action at Black Hat USA 2024.<\/h3>\n<p>Palo Alto Networks is a top sponsor and supporter of the Network and Security Operations Center (NOC\/SOC) at <a href=\"https:\/\/www.blackhat.com\/us-24\/\" rel=\"nofollow,noopener\" >Black Hat USA 2024<\/a> in Las Vegas, NV. Black Hat is a premier cybersecurity conference that brings together security professionals, researchers and leaders to discuss the latest threats, trends and technologies in information security. The event features hands-on training, briefings on the latest in information security research, and networking opportunities for professionals at all career levels.<\/p>\n<p>Dive into the heart of innovation and explore cutting-edge Precision AI\u2122 technology by Palo Alto Networks at Booth #1632 in the business hall. Network with InfoSec professionals, gain insights from thought leaders, experience our immersive demos, and discover new open-source tools at the Arsenal.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"803\"><span class=\"ar-custom\" style=\"padding-bottom:66.63%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-324963 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2024\/07\/AWS-2023_0017.jpg\" alt=\"\" width=\"803\" height=\"535\" \/><\/span><\/div><\/p>\n<h2><a id=\"post-324902-_dxqw07f9q9dw\"><\/a>The Battle to Defeat AI Threats Is Happening at Booth #1632<\/h2>\n<p>Immerse yourself in the comprehensive security solutions of Palo Alto Networks through live demos and in-booth theater sessions. Our team of experts will showcase real-world attack techniques, innovative defense strategies and our latest product advancements powered by <a href=\"https:\/\/www.paloaltonetworks.com\/precision-ai-security\">Precision AI.<\/a><\/p>\n<ul>\n<li>Experience <a href=\"https:\/\/www.paloaltonetworks.com\/cortex\">Cortex\u00ae<\/a>, our unified SecOps platform.<\/li>\n<li>Discover <a href=\"https:\/\/www.prismacloud.io\/\" rel=\"nofollow,noopener\" >Prisma\u00ae Cloud<\/a>, the Code to Cloud\u2122 platform.<\/li>\n<li>Learn from the expertise of<a href=\"https:\/\/www.paloaltonetworks.com\/unit42\"> Unit 42\u00ae<\/a>, our team of expert security advisors dedicated to creating an intelligence-driven, response-ready organization.<\/li>\n<li>Explore how Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/security-subscriptions\">Cloud-Delivered Security Services<\/a> instantly stops zero day threats and secures your entire network.<\/li>\n<li>Learn how your organization can protect your AI applications, models and data against a new wave of threats with <a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/prisma-ai-runtime-security\">AI Runtime Security<\/a>.<\/li>\n<li>Discover how <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/ai-access-security\">AI Access Security<\/a> reduces data and security risks to empower organizations to securely adopt and use GenAI applications.<\/li>\n<\/ul>\n<h2><a id=\"post-324902-_z5qzizqq7fk6\"><\/a>Staying Ahead in Today\u2019s Digital Landscape<\/h2>\n<p>Threats are accelerating in scale, sophistication and speed. Our products, powered by Precision AI, can help you stay ahead of cybercriminals by enabling you to counter AI-enabled threat actors, secure AI by design, and simplify security with generative AI. Our carefully curated sessions will not only prepare your teams to handle current threats but also empower them to anticipate and adapt to future challenges. By integrating AI-driven strategies and focusing on real-world scenarios, we enable your organization to stay ahead in the cybersecurity race.<\/p>\n<h4><a id=\"post-324902-_ao2ba7ccmswi\"><\/a>Let the Cache Cache and Let the WebAssembly Assemble: Knockin\u2019 on Chrome\u2019s Shell<\/h4>\n<p><a href=\"https:\/\/www.blackhat.com\/us-24\/briefings\/schedule\/index.html#let-the-cache-cache-and-let-the-webassembly-assemble-knockin-on-chromes-shell-39312\" rel=\"nofollow,noopener\" ><em>Briefing Session <\/em><\/a><\/p>\n<p><em>Wednesday, August 7 | 10:20 AM - 11AM <\/em><\/p>\n<p>Exploiting the Chrome browser with V8 JavaScript engine vulnerabilities has become increasingly difficult due to the V8 team\u2019s continuous security improvements, especially for the introduction of V8 Sandbox. This presentation discloses the full V8 exploit chain used against Google Chrome and Microsoft Edge to break both V8 and V8 Sandbox at Pwn2Own Vancouver 2024, ending Chrome's three-year unbroken streak.<\/p>\n<p>We will detail how a single JavaScript object creation can trick the V8 engine, discuss universal techniques for converting an out-of-bounds read vulnerability into a highly reliable exploit, and share our novel V8 Sandbox escape technique.<\/p>\n<h4><a id=\"post-324902-_m7wtv06yonck\"><\/a>AI vs AI: Using Precision AI Technology to Counter AI-Enabled Threat Actors<\/h4>\n<p><a href=\"https:\/\/www.blackhat.com\/us-24\/sponsored-sessions\/schedule\/index.html#ai-vs-ai-using-precision-ai-to-counter-ai-enabled-threat-actors-41793\" rel=\"nofollow,noopener\" ><em>Lunch &amp; Learn Session<\/em><\/a><\/p>\n<p><em>Wednesday, August 7 | 12:05 \u2013 1:30 PM <\/em><\/p>\n<p>Join Scott Fanning, vice president of product management at Palo Alto Networks, for this lunch and learn session as he discusses how threat actors are taking advantage of the advent of AI and how network security must evolve to fight back.<\/p>\n<h4><a id=\"post-324902-_rc074fljl985\"><\/a>Navigating the Threat Landscape: War Room Best Practices for the Next Major Threat<\/h4>\n<p><a href=\"https:\/\/www.blackhat.com\/us-24\/sponsored-sessions\/schedule\/index.html#navigating-the-threat-landscape-war-room-best-practices-for-the-next-major-threat-41762\" rel=\"nofollow,noopener\" ><em>Sponsored Session<\/em><\/a><\/p>\n<p><em>Wednesday, August 7 | 1:30 \u2013 2:20 PM <\/em><\/p>\n<p>Join our Cortex and Unit 42 teams to master threat intelligence and rapid response planning while analyzing strategic War Room activities for effective security event preparation and response.<\/p>\n<h4><a id=\"post-324902-_oqbq0xf0u9s9\"><\/a>From Exploit to Shield: Attacking Generative AI Apps to Create Cyber Resilience<\/h4>\n<p><a href=\"https:\/\/www.blackhat.com\/us-24\/sponsored-sessions\/schedule\/index.html#from-exploit-to-shield-attacking-generative-ai-apps-to-create-cyber-resilience-41792\" rel=\"nofollow,noopener\" ><em>Sponsored Session <\/em><\/a><\/p>\n<p><em>Wednesday, August 7 | 2:35 \u2013 3:25 PM <\/em><\/p>\n<p>Explore emerging threats to generative AI with Michael Sikorski, CTO of Unit 42, and Mike Spisak, technical managing director of Unit 42, at Palo Alto Networks. See how attacks bypass security, manipulate AI content and compromise data through live demos.<\/p>\n<h4><a id=\"post-324902-_ha8b8081sl1b\"><\/a>Cloud Offensive Breach and Risk Assessment (COBRA)<\/h4>\n<p><a href=\"https:\/\/www.blackhat.com\/us-24\/arsenal\/schedule\/#cloud-offensive-breach-and-risk-assessment-cobra-39337\" rel=\"nofollow,noopener\" ><em>Arsenal Session<\/em><\/a><\/p>\n<p><em>Thursday, August 8 | 10:10 - 11:20 AM <\/em><\/p>\n<p>Cloud Offensive Breach and Risk Assessment (COBRA) is an open-source tool designed to empower users to simulate attacks within multicloud environments, offering a comprehensive evaluation of security controls. By automating the testing of various threat vectors, including external and insider threats, lateral movement and data exfiltration, COBRA enables organizations to gain insights into their security posture vulnerabilities. COBRA is designed to conduct simulated attacks to assess an organization's ability to detect and respond to security threats effectively.<\/p>\n<h2><a id=\"post-324902-_1s3xoeqs2rca\"><\/a>Securing Black Hat\u2019s NOC: The Critical Role of Palo Alto Networks<\/h2>\n<p>The network and security operations center (NOC\/SOC) at the Black Hat USA Conference serves the critical role of ensuring that the conference's entire bespoke network is running smoothly and efficiently, as well as detecting and responding to any security threats. As a trusted partner, Palo Alto Networks has officially supported Black Hat 21 times over the last seven years at their conferences around the world. Together with the other NOC partners, Arista, Cisco, Corelight, Lumen and NetWitness, we provide enterprise-class network security, security automation, threat hunting and visibility into one of the most dangerous networks in the world.<\/p>\n<p>To see the team in action, the Black Hat NOC will be streamed live via the conference Twitch channel, or you can visit and tour the NOC on-site. With the help of partners like Palo Alto Networks, Black Hat is able to provide a strong network and security infrastructure that allows attendees to focus on learning and networking without worrying about their cybersecurity.<\/p>\n<h2><a id=\"post-324902-_fhsl78gizxg6\"><\/a>Unwind at Our After-Hour Events<\/h2>\n<p>As the expo day winds down, gear up for an exhilarating evening of relaxation, delicious food and drinks, socializing with your peers at our evening events.<\/p>\n<h4><a id=\"post-324902-_jbb2iv7ep9ew\"><\/a>Attend Our Networking SOCial @ KUMI<\/h4>\n<p><em>Wednesday, August 7 | 6 \u2013 8PM <\/em><\/p>\n<p>Experience a modern approach to Japanese Cuisine and specialty libations as you mingle with a who\u2019s who of cybersecurity leaders and experts from across the world. Register for our <a href=\"https:\/\/register.paloaltonetworks.com\/blackhatnetworkingreceptionhostedbypaloaltonetwork6679a9259f549\">Networking SOCial<\/a> now.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"582\"><span class=\"ar-custom\" style=\"padding-bottom:75.09%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-324916 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2024\/07\/word-image-324902-2.png\" alt=\"\" width=\"582\" height=\"437\" \/><\/span><\/div><\/p>\n<h4><a id=\"post-324902-_g1jp31zdprdf\"><\/a>From Ice Age to AI: The Future of the SOC is Here @ minus5 &amp; 1923 Prohibition Bar<\/h4>\n<p><em>Wednesday, August 7 | 7 \u2013 10PM <\/em><\/p>\n<p>Escape the ice age of outdated security operations and step into the future with Palo Alto Networks at our exclusive after-hours party. Test your knowledge in a thrilling game of collective battle cards featuring infamous threat actors and explore the Unit 42 War Room, where you\u2019ll interact with incident responders as they take on a live breach. Register now for <a href=\"https:\/\/register.paloaltonetworks.com\/fromtheiceagetoai-nv\">From Ice Age to AI: The future of the SOC is here<\/a>.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"600\"><span class=\"ar-custom\" style=\"padding-bottom:75%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-324929 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2024\/07\/word-image-324902-3.jpeg\" alt=\"\" width=\"600\" height=\"450\" \/><\/span><\/div><\/p>\n<h2>Strengthening Cybersecurity Through Strategic Partnerships<\/h2>\n<p>Strong Partnerships are critical in helping organizations improve their security posture and embrace the potential of AI.<\/p>\n<p>At Black Hat, we\u2019re teaming with strategic partners across our ecosystem to show how we\u2019re amplifying the innovations and cutting-edge cybersecurity solutions we provide through our partnerships. To discover the depth of these collaborations, visit our booth at Black Hat 2024 and explore firsthand how these alliances redefine security standards.<\/p>\n<p>For more information about Palo Alto Networks cybersecurity solutions and our support of the Black Hat NOC, visit Booth #1632 or the NOC on-site in rooms <em>Surf E&amp;F<\/em>. Visit our <a href=\"https:\/\/register.paloaltonetworks.com\/paloaltonetworksblackhat2024\">event page <\/a>for more details.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At Black Hat USA 2024, discover how cyber resilience solutions from Palo Alto Networks powered by Precision AI\u2122 can help you trust AI outcomes.<\/p>\n","protected":false},"author":723,"featured_media":324942,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[308],"tags":[166,586],"coauthors":[9928],"class_list":["post-324902","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcement","tag-black-hat","tag-unit-42"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2024\/07\/GettyImages-1150572034-edit.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/324902","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=324902"}],"version-history":[{"count":7,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/324902\/revisions"}],"predecessor-version":[{"id":325160,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/324902\/revisions\/325160"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/324942"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=324902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=324902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=324902"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=324902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}