Netskope is recognized as a Leader again in the Gartner® Magic Quadrant™ for SASE Platforms. Get the Report

close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
Experience Netskope
Get Hands-on With the Netskope Platform
Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
A Leader in SSE. Now a Leader in Single-Vendor SASE.
Netskope is recognized as a Leader Furthest in Vision for both SSE and SASE Platforms
2X a Leader in the Gartner® Magic Quadrant for SASE Platforms
One unified platform built for your journey
Securing Generative AI for Dummies
Securing Generative AI for Dummies
Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
Modern data loss prevention (DLP) for Dummies eBook
Modern Data Loss Prevention (DLP) for Dummies
Get tips and tricks for transitioning to a cloud-delivered DLP.
Modern SD-WAN for SASE Dummies Book
Modern SD-WAN for SASE Dummies
Stop playing catch up with your networking architecture
Understanding where the risk lies
Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
Netskope Technical Support
Netskope Technical Support
Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
Netskope video
Netskope Training
Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.
Netskope at

Black Hat

Monday, August 4 - Thursday, August 7, 2025
Mandalay Bay Convention Center, Las Vegas
Booth #1864

Get your discounted Briefings or Business Hall Pass
Discount Code: NETSKOPE
Netskope at Black Hat

Experience Modern Security and Networking

 

 

Come see us in action at Black Hat 2025 for:

 

  • An opportunity to meet Netskope experts and get all your questions answered
  • Sessions and demos that highlight the unique architecture of the Netskope One platform, which enables both security and infrastructure and operations (I&O) teams to reduce risk, cost, and complexity.
  • A look at our market-leading security, network, and analytics capabilities, including our latest innovations in AI and unified data security

Speaking sessions

Your Traffic Doesn’t Lie: Unmasking Supply Chain Attacks via Application Behaviour

chevron

Your Traffic Doesn’t Lie: Unmasking Supply Chain Attacks via Application Behaviour

Thursday, August 7th at 11:20 AM
Location: South Seas A & B, Level 3
Speakers: Colin Estep – Principal Engineer, Netskope,
Dagmawi Mulugeta – Staff Threat Research Engineer, Netskope

Supply chain attacks, like SolarWinds, exploit trusted apps. BEAM detects these by analyzing web traffic without agents or code changes. It uses LLMs, behavioral signals, and baselines from 40B+ transactions to achieve over 95% accuracy. This open-source tool offers a new, effective defense against evasive threats, providing automated, scalable monitoring for both off-the-shelf and custom applications.

This session includes a live demo and practical takeaways for defenders, researchers, and security engineers alike.

Introduction To SeVa [Secret Validator] - Secrets Prioritization Framework

chevron

Introduction To SeVa [Secret Validator] – Secrets Prioritization Framework

Date: Friday August 8th, 2025
Time: 1:30 PM – 2:30 PM (PST)
Location: Las Vegas Convention Center (LVCC)
Speakers: Pramod Rana, Sr. Manager, Information Security – Redteam and Offensive Operations and Leon Denard, Information Security Engineer

SeVa (Secret Validator) is an open source solution and aims to provide an accurate triage and priority framework for secrets with below philosophy:
1) Secrets which are confirmed to be valid will be of most priority
2) Secrets which are confirmed to be not valid will be of least priority
3) Remaining secrets will have severity as per security solution and manual triage process

SeVA does that by providing a fast and noninvasive way to verify credentials with non-intrusive API calls without secrets leaving organization infrastructure and no need to provide usage permission to SaaS secret detection products.

Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking

chevron

Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking

Saturday, August 9, 11:00 – 11:50am PT
Location: Las Vegas Convention Center (LVCC)
Speakers: Hubert Lin – Principal Threat Researcher, Netskope

Description: Port knocking is a stealthy network authentication technique (T1205.001) in which a client sends a specific sequence of connection attempts (or “knocks”) to closed ports on a server. When the correct sequence is received, the server dynamically opens a port or triggers an action, enabling concealed access or communication. Saucepot C2 elevates the port knocking technique to a new level. Instead of using destination ports (DstPorts) in TCP sessions as knock sequences, it leverages source ports (SrcPorts), also known as ephemeral ports. This approach allows data exfiltration even in highly restrictive firewall environments where only a single outbound port, such as port 443, is allowed.

Introduction to CICDGuard - Orchestrating visibility and security of CICD ecosystem

chevron

Introduction to CICDGuard – Orchestrating visibility and security of CICD ecosystem

Date: Saturday, August 9, 2025
Time: 12:00 PM – 1:00 PM (PST)
Location: Las Vegas Convention Center (LVCC)
Speakers: Pramod Rana, Sr. Manager, Information Security – Redteam and Offensive Operations

CICDGuard is a graph based CICD ecosystem visualizer and security analyzer, which –
1) Represents entire CICD ecosystem in graph form, providing intuitive visibility and solving the awareness problem
2) Identifies common security flaws across supported technologies and provides industry best practices and guidelines for identified flaws adhering to OWASP CICD Top10 vulnerabilities
3) Identifies the relationship between different technologies and demonstrates how vulnerability in one component can affect one or more other technologies

 

Your Traffic Doesn’t Lie: Unmasking Supply Chain Attacks via Application Behaviour

Thursday, August 7th at 11:20 AM
Location: South Seas A & B, Level 3
Speakers: Colin Estep – Principal Engineer, Netskope,
Dagmawi Mulugeta – Staff Threat Research Engineer, Netskope

Supply chain attacks, like SolarWinds, exploit trusted apps. BEAM detects these by analyzing web traffic without agents or code changes. It uses LLMs, behavioral signals, and baselines from 40B+ transactions to achieve over 95% accuracy. This open-source tool offers a new, effective defense against evasive threats, providing automated, scalable monitoring for both off-the-shelf and custom applications.

This session includes a live demo and practical takeaways for defenders, researchers, and security engineers alike.

Introduction To SeVa [Secret Validator] – Secrets Prioritization Framework

Date: Friday August 8th, 2025
Time: 1:30 PM – 2:30 PM (PST)
Location: Las Vegas Convention Center (LVCC)
Speakers: Pramod Rana, Sr. Manager, Information Security – Redteam and Offensive Operations and Leon Denard, Information Security Engineer

SeVa (Secret Validator) is an open source solution and aims to provide an accurate triage and priority framework for secrets with below philosophy:
1) Secrets which are confirmed to be valid will be of most priority
2) Secrets which are confirmed to be not valid will be of least priority
3) Remaining secrets will have severity as per security solution and manual triage process

SeVA does that by providing a fast and noninvasive way to verify credentials with non-intrusive API calls without secrets leaving organization infrastructure and no need to provide usage permission to SaaS secret detection products.

Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking

Saturday, August 9, 11:00 – 11:50am PT
Location: Las Vegas Convention Center (LVCC)
Speakers: Hubert Lin – Principal Threat Researcher, Netskope

Description: Port knocking is a stealthy network authentication technique (T1205.001) in which a client sends a specific sequence of connection attempts (or “knocks”) to closed ports on a server. When the correct sequence is received, the server dynamically opens a port or triggers an action, enabling concealed access or communication. Saucepot C2 elevates the port knocking technique to a new level. Instead of using destination ports (DstPorts) in TCP sessions as knock sequences, it leverages source ports (SrcPorts), also known as ephemeral ports. This approach allows data exfiltration even in highly restrictive firewall environments where only a single outbound port, such as port 443, is allowed.

Introduction to CICDGuard – Orchestrating visibility and security of CICD ecosystem

Date: Saturday, August 9, 2025
Time: 12:00 PM – 1:00 PM (PST)
Location: Las Vegas Convention Center (LVCC)
Speakers: Pramod Rana, Sr. Manager, Information Security – Redteam and Offensive Operations

CICDGuard is a graph based CICD ecosystem visualizer and security analyzer, which –
1) Represents entire CICD ecosystem in graph form, providing intuitive visibility and solving the awareness problem
2) Identifies common security flaws across supported technologies and provides industry best practices and guidelines for identified flaws adhering to OWASP CICD Top10 vulnerabilities
3) Identifies the relationship between different technologies and demonstrates how vulnerability in one component can affect one or more other technologies

 

Discuss the Hottest Topics in Security

Stop by our booth to see the latest innovations in action. Presentations are every hour on the hour.

 

Detecting and Disrupting Malleable C2 Frameworks

Security

 

Security and Network Performance: No Trade-offs

High technology icon dark

 

Transform Branch Connectivity

 

Optimize Remote Access: Anyone, Anywhere, Any Device

Unified Security icon

 

Protect Data Everywhere with Unified Security

 

Live Demos

Guidepoint Security Party during Black Hat

Date: Tuesday, August 5
Time: 6:30-8:30pm
Location: Swingers – The Crazy Golf Club | Mandalay Bay

 

You’re Invited to the Ultimate Black Hat Bash!

 

GuidePoint Security is turning up the energy with another unforgettable Black Hat Party, this time at a brand-new venue: Swingers – The Crazy Golf Club.

 

Join us for a night of networking, mini golf, and great vibes as you connect with our security experts and industry partners. It’s the perfect way to tee off an action-packed week in Vegas.

 

Spots are limited, so bring your A-game and get ready for a night to remember.

Swingers Golf at Mandalay Bay

Let's Connect

 

Meet with our subject matter experts and learn how Netskope, a leader in Security Service Edge (SSE) and Secure Access Service Edge (SASE), delivers unmatched security and uncompromising performance at the edge

 

Netskope Booth #1864