Black Hat USA 2025 by the numbers
Black Hat USA 2025 drew more than 22,000 information and cybersecurity professionals and 400 exhibitors, providing over 100 presentations from leading industry experts and keynote speakers.
No shortage of cybersecurity challenges
We are decades beyond the digital world being something that is accessed primarily from our work stations. The scope of cybersecurity has exploded since the start of the 21st century, and cybersecurity professionals no longer have the luxury of focusing on a small set of risks—that ship has sailed.
Black Hat USA covered a wide range of topics spanning the double-edged sword that is AI: the emergence of the cloud as the new battle ground, taking a more offensive cybersecurity approach, securing supply chains from cyber threats, and elevating cybersecurity from a technical function to a strategic business enabler were just a few of the topics covered.
Big threats mean big opportunities
The event’s keynote presentations explored how automation and AI are amplifying the consequences of malicious activity. Malware is no longer the medium of pranksters—it is the sophisticated tool of organized, financially motivated threat actors and is powered by the cutting edge of modern computing. Additionally, these threats are targeting more than just code—they are targeting people, institutions, and truth itself.
This gives chief information security officers (CISOs) and their teams an opportunity to demonstrate the tangible value of their work and technology investments in their organizations.
“Ordo ab Chao” – Order from Chaos
Another one of the things we heard over and over from customers at Black Hat USA was just how noisy and chaotic the cybersecurity space is today. Creating order from chaos is easier said than done, but it’s essentially what CISOs and their teams are being asked to do.
Over the last five years, CISOs have had to come to terms with the fact that, when it comes to cybersecurity tools, more of them does not result in better outcomes. The cybersecurity vendor ecosystem now understands the need to differentiate and prove tangible value that can be tied directly to business outcomes. No one wants to be a “nice-to-have” tool. This is because CISOs don’t have time or money to waste on technology that doesn’t secure their organizations’ digital assets.
Preemptive cybersecurity is mission critical
Dataminr was up to the challenge. At Black Hat USA, we gathered cyber experts at an executive panel titled: How AI and preemptive cybersecurity are shaping the next generation of threat mitigation. Panelists discussed how their organizations are shifting from a reactive to a preemptive cybersecurity posture, and how Dataminr’s AI platform is a critical component that supercharges processes, allows their cybersecurity teams to do more with the existing resources, and puts teams on a more even footing with threat actors.
Internal telemetry will always be a critical component of cybersecurity, but as threat actors become faster and more efficient, cybersecurity teams will need tools like Dataminr Pulse for Cyber Risk to access a comprehensive set of eternal data sources, analyze data at machine speed, and extract context and potential consequences for efficient prioritization. Reliance on existing methods will cause the existing capability gap between threat actors and cybersecurity teams to widen.

Five Ways to Preempt Cyberattacks with Actionable Intelligence
Interested in seeing how Dataminr enhances your cybersecurity investments that are crucial for protecting your organization’s digital assets? Watch our on-demand webinar now.
WATCH ON-DEMAND WEBINAR