The Dos and Don’ts – Black Hat USA 2021

The Dos and Don’ts – Black Hat USA 2021


Share on linkedin
Share on facebook
Share on twitter

A CISO, a pen tester, and a vulnerability manager walked into a Vegas Casino… this is not the beginning of a joke, but rather a typical night at Las Vegas, Nevada, during the yearly Black Hat event. 

So it’s that time of the year again, and whether you’re a newbie or an experienced black hater, the excitement is always great before the black hat event. 

For 24 years in a row, the black hat conference is gathering all cyber enthusiasts into one big happy community. The big event starts with four days of real-time virtual cybersecurity training, followed by two main conference days. You can walk around the business hall, hear briefings, and discover new trends and technologies in the industry.

So you purchased the ticket, booked the flight, and a few meetings; you’re just about to pack that bag and hit the road. But wait a second, you might want to make sure you don’t forget anything, or rather, you don’t take what’s not essential. 

The World’s Most Hostile Network 

The greater the thrill, the greater the risk; be well prepared for the BH event, there’s a reason why it’s notorious for its hostile network environment. Make sure you don’t end up on the (*)wall of sheeps! For that, we piled up a shortlist of security operational dos and don’ts for the black hat US 2021 event, so if you’re heading in that direction, this read is for you.

(*)-Wall Of Sheeps- it’s the black hat event’s wall of shame, but even worse. If you get hacked during the event – the wall of sheeps for you.


The Do’s: 

  • Run Updates- Run software updates on every device you plan on carrying with you to the event. Old software versions are way less secure and are usually the first to be targeted. 
  • Disable Wifi & Bluetooth Auto Connections- Disable all Wifi & Bluetooth auto connections from every device you bring along to the event; laptops, mobiles, Ipads & tablets, beepers, etc.
  •  Privacy screen everything- Many security guys are messing around during the event, trying to hack their way into random systems. They won’t be investing efforts in hacking to yours if they can just read everything directly from your screen.

The Don’ts:

  • Don’t browse freely online- When browsing the public internet, especially in such “hostile” environments, stay focused on the essentials and use a VPN to secure your browsing. Avoid unnecessary web surfing, don’t check your mortgage, health insurance, or bank balance. 
  • Payments- Don’t carry credit cards with you; either keep it old school and walk around with cash in that pocket or embrace digital transformation – it’s time to set up those digital wallets; google, apple, pick your butter. 
  • Don’t be the sheep- It’s not the time to join the herd; you want to walk out of the black hat event free from hacks and free of shame. You have a reputation to save: yours and your team’s

Tip for Black Hat Pro’s:

The Black Hat event is an excellent opportunity to network with industry leaders and discover new technologies to best operate your IT & security operations. Be well prepared for your needs and pain points, and aim to leverage as much as possible out of those four days. 

Meet Reposify at the Black Hat event

If you want to discover your exposures and unknown security vulnerabilities, book a meeting with Reposify and get a free and personalized report of your organization’s external attack surface. It’s time to improve your network visibility.

New call-to-action

Reposify is an attack surface management platform delivering autonomous 24/7 discovery of exposed assets across all environments and the supply chain. Leading enterprises worldwide use Reposify to gain unparalleled visibility of their internet-facing assets and actionable security insights for eliminating shadow IT risks in real-time


Share on linkedin
Share on facebook
Share on twitter

Ready to discover your External Attack Surface?

Read Next

The foundation of Cybersecurity: External Attack Surface Visibility.

The move to cloud changes how organizations protect data by creating distributed workforces and IT ecosystems. In parallel, threat actors target organizations because they know that these changes create visibility issues. 

This is how cybersecurity teams can improve IT asset management

Many organizations don’t realize that as they move mission-critical operations to the cloud, they also lose visibility into their assets. The answer lies in learning how to improve IT asset management.

External Attack Surface Management for Red Teams

With real-time visibility into the external attack surface, Red Teams can know when new assets go online for dynamic security across complex cloud and IT infrastructures.