Cybersecurity, Artificial Intelligence

Black Hat USA 2025 by the numbers

Black Hat USA 2025 drew more than 22,000 information and cybersecurity professionals and 400 exhibitors, providing over 100 presentations from leading industry experts and keynote speakers.

No shortage of cybersecurity challenges

We are decades beyond the digital world being something that is accessed primarily from our work stations. The scope of cybersecurity has exploded since the start of the 21st century, and cybersecurity professionals no longer have the luxury of focusing on a small set of risks—that ship has sailed.

Black Hat USA covered a wide range of topics spanning the double-edged sword that is AI: the emergence of the cloud as the new battle ground, taking a more offensive cybersecurity approach, securing supply chains from cyber threats, and elevating cybersecurity from a technical function to a strategic business enabler were just a few of the topics covered.

Big threats mean big opportunities

The event’s keynote presentations explored how automation and AI are amplifying the consequences of malicious activity. Malware is no longer the medium of pranksters—it is the sophisticated tool of organized, financially motivated threat actors and is powered by the cutting edge of modern computing. Additionally, these threats are targeting more than just code—they are targeting people, institutions, and truth itself.

This gives chief information security officers (CISOs) and their teams an opportunity to demonstrate the tangible value of their work and technology investments in their organizations.

“Ordo ab Chao” – Order from Chaos

Another one of the things we heard over and over from customers at Black Hat USA was just how noisy and chaotic the cybersecurity space is today. Creating order from chaos is easier said than done, but it’s essentially what CISOs and their teams are being asked to do. 

Over the last five years, CISOs have had to come to terms with the fact that, when it comes to cybersecurity tools, more of them does not result in better outcomes. The cybersecurity vendor ecosystem now understands the need to differentiate and prove tangible value that can be tied directly to business outcomes. No one wants to be a “nice-to-have” tool. This is because CISOs don’t have time or money to waste on technology that doesn’t secure their organizations’ digital assets.

Preemptive cybersecurity is mission critical

Dataminr was up to the challenge. At Black Hat USA, we gathered cyber experts at an executive panel titled: How AI and preemptive cybersecurity are shaping the next generation of threat mitigation. Panelists discussed how their organizations are shifting from a reactive to a preemptive cybersecurity posture, and how Dataminr’s AI platform is a critical component that supercharges processes, allows their cybersecurity teams to do more with the existing resources, and puts teams on a more even footing with threat actors.

Internal telemetry will always be a critical component of cybersecurity, but as threat actors become faster and more efficient, cybersecurity teams will need tools like Dataminr Pulse for Cyber Risk to access a comprehensive set of eternal data sources, analyze data at machine speed, and extract context and potential consequences for efficient prioritization. Reliance on existing methods will cause the existing capability gap between threat actors and cybersecurity teams to widen.

Five Ways to Preempt Cyberattacks with Actionable Intelligence

Interested in seeing how Dataminr enhances your cybersecurity investments that are crucial for protecting your organization’s digital assets? Watch our on-demand webinar now.

WATCH ON-DEMAND WEBINAR
Author
Adrian Meyer, Director, Product Marketing
August 14, 2025
  • Cybersecurity
  • Artificial Intelligence
  • Cyber Risk
  • Blog

Related resources

Blog

4 Key Takeaways from Esri Safety & Security Summit and User Conference 2025

Highlights of the Esri Safety & Security Summit (ES3) and User Conference include the Esri advantage, accelerated crisis response, the future of large-scale event security, and deeper Esri-Dataminr integration.

Blog

Scattered Spider is Wreaking Cyber Havoc. Here’s How to Stay Ahead.

Scattered Spider, a notorious cyber criminal group, has captured many headlines recently, but the group has an extensive history. Knowing this background provides opportunities for defense and prevention, allowing organizations to respond and defeat such operations and mitigate potential loss.

Blog

The ROI and Strategic Benefits of Dataminr First Alert’s Real-Time Event Detection

Explore key findings from a new Forrester report, “The Total Economic Impact™ of Dataminr First Alert,” to understand the return on investment (ROI) of First Alert and how it benefits public sector organizations—from enhancing decision making to boosting efficiency and crisis response times.