Launch Event: Smart AI Security. Full Data Control. Reserve your seat

close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
          Experience Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            Netskope is recognized as a Leader Furthest in Vision for both SSE and SASE Platforms
            2X a Leader in the Gartner® Magic Quadrant for SASE Platforms
            One unified platform built for your journey
              Securing Generative AI for Dummies
              Securing Generative AI for Dummies
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Modern Data Loss Prevention (DLP) for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modern SD-WAN for SASE Dummies Book
                  Modern SD-WAN for SASE Dummies
                  Stop playing catch up with your networking architecture
                    Understanding where the risk lies
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        Netskope Technical Support
                        Netskope Technical Support
                        Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
                          Netskope video
                          Netskope Training
                          Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.
                            Netskope at

                            Black Hat

                            Monday, August 4 - Thursday, August 7, 2025
                            Mandalay Bay Convention Center, Las Vegas
                            Booth #1864

                            Get your discounted Briefings or Business Hall Pass
                            Discount Code: NETSKOPE
                            Netskope at Black Hat

                            Experience Modern Security and Networking

                             

                             

                            Come see us in action at Black Hat 2025 for:

                             

                            • An opportunity to meet Netskope experts and get all your questions answered
                            • Sessions and demos that highlight the unique architecture of the Netskope One platform, which enables both security and infrastructure and operations (I&O) teams to reduce risk, cost, and complexity.
                            • A look at our market-leading security, network, and analytics capabilities, including our latest innovations in AI and unified data security

                            Speaking sessions

                            Your Traffic Doesn’t Lie: Unmasking Supply Chain Attacks via Application Behaviour

                            chevron

                            Your Traffic Doesn’t Lie: Unmasking Supply Chain Attacks via Application Behaviour

                            Thursday, August 7th at 11:20 AM
                            Location: South Seas A & B, Level 3
                            Speakers: Colin Estep – Principal Engineer, Netskope,
                            Dagmawi Mulugeta – Staff Threat Research Engineer, Netskope

                            Supply chain attacks, like SolarWinds, exploit trusted apps. BEAM detects these by analyzing web traffic without agents or code changes. It uses LLMs, behavioral signals, and baselines from 40B+ transactions to achieve over 95% accuracy. This open-source tool offers a new, effective defense against evasive threats, providing automated, scalable monitoring for both off-the-shelf and custom applications.

                            This session includes a live demo and practical takeaways for defenders, researchers, and security engineers alike.

                            Introduction To SeVa [Secret Validator] - Secrets Prioritization Framework

                            chevron

                            Introduction To SeVa [Secret Validator] – Secrets Prioritization Framework

                            Date: Friday August 8th, 2025
                            Time: 1:30 PM – 2:30 PM (PST)
                            Location: Las Vegas Convention Center (LVCC)
                            Speakers: Pramod Rana, Sr. Manager, Information Security – Redteam and Offensive Operations and Leon Denard, Information Security Engineer

                            SeVa (Secret Validator) is an open source solution and aims to provide an accurate triage and priority framework for secrets with below philosophy:
                            1) Secrets which are confirmed to be valid will be of most priority
                            2) Secrets which are confirmed to be not valid will be of least priority
                            3) Remaining secrets will have severity as per security solution and manual triage process

                            SeVA does that by providing a fast and noninvasive way to verify credentials with non-intrusive API calls without secrets leaving organization infrastructure and no need to provide usage permission to SaaS secret detection products.

                            Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking

                            chevron

                            Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking

                            Saturday, August 9, 11:00 – 11:50am PT
                            Location: Las Vegas Convention Center (LVCC)
                            Speakers: Hubert Lin – Principal Threat Researcher, Netskope

                            Description: Port knocking is a stealthy network authentication technique (T1205.001) in which a client sends a specific sequence of connection attempts (or “knocks”) to closed ports on a server. When the correct sequence is received, the server dynamically opens a port or triggers an action, enabling concealed access or communication. Saucepot C2 elevates the port knocking technique to a new level. Instead of using destination ports (DstPorts) in TCP sessions as knock sequences, it leverages source ports (SrcPorts), also known as ephemeral ports. This approach allows data exfiltration even in highly restrictive firewall environments where only a single outbound port, such as port 443, is allowed.

                            Introduction to CICDGuard - Orchestrating visibility and security of CICD ecosystem

                            chevron

                            Introduction to CICDGuard – Orchestrating visibility and security of CICD ecosystem

                            Date: Saturday, August 9, 2025
                            Time: 12:00 PM – 1:00 PM (PST)
                            Location: Las Vegas Convention Center (LVCC)
                            Speakers: Pramod Rana, Sr. Manager, Information Security – Redteam and Offensive Operations

                            CICDGuard is a graph based CICD ecosystem visualizer and security analyzer, which –
                            1) Represents entire CICD ecosystem in graph form, providing intuitive visibility and solving the awareness problem
                            2) Identifies common security flaws across supported technologies and provides industry best practices and guidelines for identified flaws adhering to OWASP CICD Top10 vulnerabilities
                            3) Identifies the relationship between different technologies and demonstrates how vulnerability in one component can affect one or more other technologies

                             

                            Your Traffic Doesn’t Lie: Unmasking Supply Chain Attacks via Application Behaviour

                            Thursday, August 7th at 11:20 AM
                            Location: South Seas A & B, Level 3
                            Speakers: Colin Estep – Principal Engineer, Netskope,
                            Dagmawi Mulugeta – Staff Threat Research Engineer, Netskope

                            Supply chain attacks, like SolarWinds, exploit trusted apps. BEAM detects these by analyzing web traffic without agents or code changes. It uses LLMs, behavioral signals, and baselines from 40B+ transactions to achieve over 95% accuracy. This open-source tool offers a new, effective defense against evasive threats, providing automated, scalable monitoring for both off-the-shelf and custom applications.

                            This session includes a live demo and practical takeaways for defenders, researchers, and security engineers alike.

                            Introduction To SeVa [Secret Validator] – Secrets Prioritization Framework

                            Date: Friday August 8th, 2025
                            Time: 1:30 PM – 2:30 PM (PST)
                            Location: Las Vegas Convention Center (LVCC)
                            Speakers: Pramod Rana, Sr. Manager, Information Security – Redteam and Offensive Operations and Leon Denard, Information Security Engineer

                            SeVa (Secret Validator) is an open source solution and aims to provide an accurate triage and priority framework for secrets with below philosophy:
                            1) Secrets which are confirmed to be valid will be of most priority
                            2) Secrets which are confirmed to be not valid will be of least priority
                            3) Remaining secrets will have severity as per security solution and manual triage process

                            SeVA does that by providing a fast and noninvasive way to verify credentials with non-intrusive API calls without secrets leaving organization infrastructure and no need to provide usage permission to SaaS secret detection products.

                            Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking

                            Saturday, August 9, 11:00 – 11:50am PT
                            Location: Las Vegas Convention Center (LVCC)
                            Speakers: Hubert Lin – Principal Threat Researcher, Netskope

                            Description: Port knocking is a stealthy network authentication technique (T1205.001) in which a client sends a specific sequence of connection attempts (or “knocks”) to closed ports on a server. When the correct sequence is received, the server dynamically opens a port or triggers an action, enabling concealed access or communication. Saucepot C2 elevates the port knocking technique to a new level. Instead of using destination ports (DstPorts) in TCP sessions as knock sequences, it leverages source ports (SrcPorts), also known as ephemeral ports. This approach allows data exfiltration even in highly restrictive firewall environments where only a single outbound port, such as port 443, is allowed.

                            Introduction to CICDGuard – Orchestrating visibility and security of CICD ecosystem

                            Date: Saturday, August 9, 2025
                            Time: 12:00 PM – 1:00 PM (PST)
                            Location: Las Vegas Convention Center (LVCC)
                            Speakers: Pramod Rana, Sr. Manager, Information Security – Redteam and Offensive Operations

                            CICDGuard is a graph based CICD ecosystem visualizer and security analyzer, which –
                            1) Represents entire CICD ecosystem in graph form, providing intuitive visibility and solving the awareness problem
                            2) Identifies common security flaws across supported technologies and provides industry best practices and guidelines for identified flaws adhering to OWASP CICD Top10 vulnerabilities
                            3) Identifies the relationship between different technologies and demonstrates how vulnerability in one component can affect one or more other technologies

                             

                            Discuss the Hottest Topics in Security

                            Stop by our booth to see the latest innovations in action. Presentations are every hour on the hour.

                             

                            Detecting and Disrupting Malleable C2 Frameworks

                            Security

                             

                            Security and Network Performance: No Trade-offs

                            High technology icon dark

                             

                            Transform Branch Connectivity

                             

                            Optimize Remote Access: Anyone, Anywhere, Any Device

                            Unified Security icon

                             

                            Protect Data Everywhere with Unified Security

                             

                            Live Demos

                            Guidepoint Security Party during Black Hat

                            Date: Tuesday, August 5
                            Time: 6:30-8:30pm
                            Location: Swingers – The Crazy Golf Club | Mandalay Bay

                             

                            You’re Invited to the Ultimate Black Hat Bash!

                             

                            GuidePoint Security is turning up the energy with another unforgettable Black Hat Party, this time at a brand-new venue: Swingers – The Crazy Golf Club.

                             

                            Join us for a night of networking, mini golf, and great vibes as you connect with our security experts and industry partners. It’s the perfect way to tee off an action-packed week in Vegas.

                             

                            Spots are limited, so bring your A-game and get ready for a night to remember.

                            Swingers Golf at Mandalay Bay

                            Let's Connect

                             

                            Meet with our subject matter experts and learn how Netskope, a leader in Security Service Edge (SSE) and Secure Access Service Edge (SASE), delivers unmatched security and uncompromising performance at the edge

                             

                            Netskope Booth #1864