close
close
""
The AI Security Playbook
This playbook explores six core security challenges organizations face when adopting AI, along with proven, real-world strategies to address them.
            Experience Netskope
            Get Hands-on With the Netskope Platform
            Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
              A Leader in SSE. Now a Leader in Single-Vendor SASE.
              Netskope is recognized as a Leader Furthest in Vision for both SSE and SASE Platforms
              2X a Leader in the Gartner® Magic Quadrant for SASE Platforms
              One unified platform built for your journey
                ""
                Netskope One AI Security
                Organizations need secure AI to move their business forward, but controls and guardrails must not require sacrifices in speed or user experience. Netskope can help you say yes to the AI advantage.
                  ""
                  Netskope One AI Security
                  Organizations need secure AI to move their business forward, but controls and guardrails must not require sacrifices in speed or user experience. Netskope can help you say yes to the AI advantage.
                    Modern data loss prevention (DLP) for Dummies eBook
                    Modern Data Loss Prevention (DLP) for Dummies
                    Get tips and tricks for transitioning to a cloud-delivered DLP.
                      Modern SD-WAN for SASE Dummies Book
                      Modern SD-WAN for SASE Dummies
                      Stop playing catch up with your networking architecture
                        Understanding where the risk lies
                        Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                            Netskope Technical Support
                            Netskope Technical Support
                            Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
                              Netskope video
                              Netskope Training
                              Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.
                                Netskope at

                                Black Hat

                                Monday, August 4 - Thursday, August 7, 2025
                                Mandalay Bay Convention Center, Las Vegas
                                Booth #1864

                                Get your discounted Briefings or Business Hall Pass
                                Discount Code: NETSKOPE
                                Netskope at Black Hat

                                Experience Modern Security and Networking

                                 

                                 

                                Come see us in action at Black Hat 2025 for:

                                 

                                • An opportunity to meet Netskope experts and get all your questions answered
                                • Sessions and demos that highlight the unique architecture of the Netskope One platform, which enables both security and infrastructure and operations (I&O) teams to reduce risk, cost, and complexity.
                                • A look at our market-leading security, network, and analytics capabilities, including our latest innovations in AI and unified data security

                                Speaking sessions

                                Your Traffic Doesn’t Lie: Unmasking Supply Chain Attacks via Application Behaviour

                                chevron

                                Your Traffic Doesn’t Lie: Unmasking Supply Chain Attacks via Application Behaviour

                                Thursday, August 7th at 11:20 AM
                                Location: South Seas A & B, Level 3
                                Speakers: Colin Estep – Principal Engineer, Netskope,
                                Dagmawi Mulugeta – Staff Threat Research Engineer, Netskope

                                Supply chain attacks, like SolarWinds, exploit trusted apps. BEAM detects these by analyzing web traffic without agents or code changes. It uses LLMs, behavioral signals, and baselines from 40B+ transactions to achieve over 95% accuracy. This open-source tool offers a new, effective defense against evasive threats, providing automated, scalable monitoring for both off-the-shelf and custom applications.

                                This session includes a live demo and practical takeaways for defenders, researchers, and security engineers alike.

                                Introduction To SeVa [Secret Validator] - Secrets Prioritization Framework

                                chevron

                                Introduction To SeVa [Secret Validator] – Secrets Prioritization Framework

                                Date: Friday August 8th, 2025
                                Time: 1:30 PM – 2:30 PM (PST)
                                Location: Las Vegas Convention Center (LVCC)
                                Speakers: Pramod Rana, Sr. Manager, Information Security – Redteam and Offensive Operations and Leon Denard, Information Security Engineer

                                SeVa (Secret Validator) is an open source solution and aims to provide an accurate triage and priority framework for secrets with below philosophy:
                                1) Secrets which are confirmed to be valid will be of most priority
                                2) Secrets which are confirmed to be not valid will be of least priority
                                3) Remaining secrets will have severity as per security solution and manual triage process

                                SeVA does that by providing a fast and noninvasive way to verify credentials with non-intrusive API calls without secrets leaving organization infrastructure and no need to provide usage permission to SaaS secret detection products.

                                Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking

                                chevron

                                Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking

                                Saturday, August 9, 11:00 – 11:50am PT
                                Location: Las Vegas Convention Center (LVCC)
                                Speakers: Hubert Lin – Principal Threat Researcher, Netskope

                                Description: Port knocking is a stealthy network authentication technique (T1205.001) in which a client sends a specific sequence of connection attempts (or “knocks”) to closed ports on a server. When the correct sequence is received, the server dynamically opens a port or triggers an action, enabling concealed access or communication. Saucepot C2 elevates the port knocking technique to a new level. Instead of using destination ports (DstPorts) in TCP sessions as knock sequences, it leverages source ports (SrcPorts), also known as ephemeral ports. This approach allows data exfiltration even in highly restrictive firewall environments where only a single outbound port, such as port 443, is allowed.

                                Introduction to CICDGuard - Orchestrating visibility and security of CICD ecosystem

                                chevron

                                Introduction to CICDGuard – Orchestrating visibility and security of CICD ecosystem

                                Date: Saturday, August 9, 2025
                                Time: 12:00 PM – 1:00 PM (PST)
                                Location: Las Vegas Convention Center (LVCC)
                                Speakers: Pramod Rana, Sr. Manager, Information Security – Redteam and Offensive Operations

                                CICDGuard is a graph based CICD ecosystem visualizer and security analyzer, which –
                                1) Represents entire CICD ecosystem in graph form, providing intuitive visibility and solving the awareness problem
                                2) Identifies common security flaws across supported technologies and provides industry best practices and guidelines for identified flaws adhering to OWASP CICD Top10 vulnerabilities
                                3) Identifies the relationship between different technologies and demonstrates how vulnerability in one component can affect one or more other technologies

                                 

                                Your Traffic Doesn’t Lie: Unmasking Supply Chain Attacks via Application Behaviour

                                Thursday, August 7th at 11:20 AM
                                Location: South Seas A & B, Level 3
                                Speakers: Colin Estep – Principal Engineer, Netskope,
                                Dagmawi Mulugeta – Staff Threat Research Engineer, Netskope

                                Supply chain attacks, like SolarWinds, exploit trusted apps. BEAM detects these by analyzing web traffic without agents or code changes. It uses LLMs, behavioral signals, and baselines from 40B+ transactions to achieve over 95% accuracy. This open-source tool offers a new, effective defense against evasive threats, providing automated, scalable monitoring for both off-the-shelf and custom applications.

                                This session includes a live demo and practical takeaways for defenders, researchers, and security engineers alike.

                                Introduction To SeVa [Secret Validator] – Secrets Prioritization Framework

                                Date: Friday August 8th, 2025
                                Time: 1:30 PM – 2:30 PM (PST)
                                Location: Las Vegas Convention Center (LVCC)
                                Speakers: Pramod Rana, Sr. Manager, Information Security – Redteam and Offensive Operations and Leon Denard, Information Security Engineer

                                SeVa (Secret Validator) is an open source solution and aims to provide an accurate triage and priority framework for secrets with below philosophy:
                                1) Secrets which are confirmed to be valid will be of most priority
                                2) Secrets which are confirmed to be not valid will be of least priority
                                3) Remaining secrets will have severity as per security solution and manual triage process

                                SeVA does that by providing a fast and noninvasive way to verify credentials with non-intrusive API calls without secrets leaving organization infrastructure and no need to provide usage permission to SaaS secret detection products.

                                Whispers Through the Firewall: Data Exfiltration and C2 with Port Knocking

                                Saturday, August 9, 11:00 – 11:50am PT
                                Location: Las Vegas Convention Center (LVCC)
                                Speakers: Hubert Lin – Principal Threat Researcher, Netskope

                                Description: Port knocking is a stealthy network authentication technique (T1205.001) in which a client sends a specific sequence of connection attempts (or “knocks”) to closed ports on a server. When the correct sequence is received, the server dynamically opens a port or triggers an action, enabling concealed access or communication. Saucepot C2 elevates the port knocking technique to a new level. Instead of using destination ports (DstPorts) in TCP sessions as knock sequences, it leverages source ports (SrcPorts), also known as ephemeral ports. This approach allows data exfiltration even in highly restrictive firewall environments where only a single outbound port, such as port 443, is allowed.

                                Introduction to CICDGuard – Orchestrating visibility and security of CICD ecosystem

                                Date: Saturday, August 9, 2025
                                Time: 12:00 PM – 1:00 PM (PST)
                                Location: Las Vegas Convention Center (LVCC)
                                Speakers: Pramod Rana, Sr. Manager, Information Security – Redteam and Offensive Operations

                                CICDGuard is a graph based CICD ecosystem visualizer and security analyzer, which –
                                1) Represents entire CICD ecosystem in graph form, providing intuitive visibility and solving the awareness problem
                                2) Identifies common security flaws across supported technologies and provides industry best practices and guidelines for identified flaws adhering to OWASP CICD Top10 vulnerabilities
                                3) Identifies the relationship between different technologies and demonstrates how vulnerability in one component can affect one or more other technologies

                                 

                                Discuss the Hottest Topics in Security

                                Stop by our booth to see the latest innovations in action. Presentations are every hour on the hour.

                                 

                                Detecting and Disrupting Malleable C2 Frameworks

                                Security

                                 

                                Security and Network Performance: No Trade-offs

                                High technology icon dark

                                 

                                Transform Branch Connectivity

                                 

                                Optimize Remote Access: Anyone, Anywhere, Any Device

                                Unified Security icon

                                 

                                Protect Data Everywhere with Unified Security

                                 

                                Live Demos

                                Guidepoint Security Party during Black Hat

                                Date: Tuesday, August 5
                                Time: 6:30-8:30pm
                                Location: Swingers – The Crazy Golf Club | Mandalay Bay

                                 

                                You’re Invited to the Ultimate Black Hat Bash!

                                 

                                GuidePoint Security is turning up the energy with another unforgettable Black Hat Party, this time at a brand-new venue: Swingers – The Crazy Golf Club.

                                 

                                Join us for a night of networking, mini golf, and great vibes as you connect with our security experts and industry partners. It’s the perfect way to tee off an action-packed week in Vegas.

                                 

                                Spots are limited, so bring your A-game and get ready for a night to remember.

                                Swingers Golf at Mandalay Bay

                                Let's Connect

                                 

                                Meet with our subject matter experts and learn how Netskope, a leader in Security Service Edge (SSE) and Secure Access Service Edge (SASE), delivers unmatched security and uncompromising performance at the edge

                                 

                                Netskope Booth #1864