• Skip to main content
  • Skip to secondary menu
  • Skip to footer

Cybersecurity Market

Cybersecurity Technologies & Markets

  • Cybersecurity Events 2026-2027
  • Sponsored Post
  • Market Reports
  • About
    • GDPR
  • Contact

Black Hat Europe 2025, December 10–11, Excel London

November 19, 2025 By admin Leave a Comment

There’s a certain energy around Black Hat each year, that sense that the industry is gathering not just to trade knowledge but to reckon with the uncomfortable realities shaping cybersecurity. The 2025 edition in London feels especially sharp. Four keynote speakers — each coming from wildly different corners of the cyber ecosystem — are set to frame the conversation in ways that cut through marketing narrative and force attention back where it belongs: threat evolution, responsibility, accountability, and the unanswered questions sitting beneath the surface of cyber defense.

The program opens on December 10 at 9:00 AM with Max Smeets bringing a keynote titled Inside the Ransomware Machine. His work over the years — from ETH Zurich to Stanford — has chipped away at the romanticized or exaggerated narratives surrounding cyber gangs. Here, the focus isn’t just scare-level analysis but a look into the operational realities of the ransomware economy. Drawing on unique access to leaked data and years of analysis, he is set to unpack what really keeps the ransomware ecosystem running, and more importantly, what might finally disrupt it. The question quietly humming beneath it: can ransomware be dismantled structurally, or are we stuck waiting for the next evolution?

Later that day at 1:30 PM, Linus Neumann takes the stage with a keynote that — judging from the title alone — will sting a bit: CYBER! Please Check All Boxes Before You Get Pwned. Neumann, Head of Security Strategy at Security Research Labs and a long-time spokesperson of the Chaos Computer Club, has earned credibility through years of exposing brittle systems masquerading as “secure enough,” especially in something as politically sensitive as election software. In London, his focus turns to corporate security cultures that lean too heavily on compliance checklists, mistaking certifications and neatly completed forms for actual resilience. It’s the kind of talk that will probably make some attendees squirm and others nod like they’ve been waiting for someone to say it out loud.

The next morning, Thursday at 9:00 AM, BBC Cyber Correspondent Joe Tidy brings a keynote that feels more human than technical: From Script Kiddie to Cyber Kingpin: Preventing the Predictable Progression. Tidy has spent years covering the world’s biggest cyberattacks and following the stories behind the headlines, and he’s seen how many major attackers don’t start as masterminds — they start as bored teenagers with access to tools they don’t fully understand. Using the Vastaamo hack and the story of Julius Kivimaki as a lens, he will explore how teenage experimentation, online subculture, and weak early intervention can harden into serious, organized cybercrime. If Smeets exposes the mechanics of cybercrime markets, Tidy examines the psychology and social pipeline that feeds them — and what might actually break that cycle before it solidifies.

The final keynote arrives on December 11 at 1:30 PM with Louise Marie Hurel presenting Who Gets to Point Fingers? Technical Capacity and International Accountability. Hurel, a researcher at the Royal United Services Institute (RUSI), works at the intersection of cyber diplomacy, attribution, and state responsibility. Her talk spotlights a question that has been sitting in the background of cyber geopolitics for years: who gets to define “truth” when it comes to naming and shaming states for cyberattacks? Attribution frameworks have largely been shaped by well-resourced Western nations, but Global South countries are increasingly challenging that center of gravity. Hurel will unpack what happens when states with limited technical infrastructure still need to attribute attacks, how they navigate dependence on external private-sector or foreign intelligence, and what the wider industry can learn from their perspectives on responsibility and fairness in cyberspace.

Black Hat Europe 2025 is supported by a sponsor ecosystem that mirrors today’s security landscape. At the Titanium level sit Broadcom, Google, and ThreatSpike Labs, underscoring the importance of cloud-scale platforms and large-scale enterprise security stacks. Diamond Sponsors include names such as Black Duck, Clover, KnowBe4, OX Security, Push Security, runZero, ThreatLocker, and TuxCare — a mix that spans software supply chain risk, human-layer security, asset visibility, and modern endpoint and workload protection. Around them, Sustaining and Global Partners such as Armis, Cisco, CrowdStrike, Cyera, Google, ManageEngine, Qualys, SentinelOne, Sophos, Tenable, ThreatLocker, Trend Micro, Varonis, Wiz, Censys, Concentric AI, Corellium, Fortra, Huntress, HackerOne, and wolfSSL reflect how broad the current security stack has become, from IoT and identity to cloud posture management and offensive testing.

As the industry heads toward London this December, there’s a sense that this year’s edition isn’t just about unveiling new tools or zero-days. It feels more like a checkpoint — a moment to question long-standing assumptions about how we defend, who we trust, and who gets to speak with authority in global cybersecurity. Maybe that’s the real theme this time: confronting the hard questions before the next wave of reality forces everyone’s hand.

Filed Under: News Tagged With: event

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Recent Posts

  • Bitdefender Expands GravityZone With Extended Email Security to Close the Inbox Gap
  • The Security Blind Spot Inside the Arduino-Powered IoT Boom
  • Altum Strategy Group: Cybersecurity in 2026 Is No Longer a Technology Problem
  • Trent AI and the Security Layer the Agentic Stack Has Been Missing
  • Gartner Security & Risk Management Summit, June 1–3, 2026, National Harbor, MD
  • Ashdod Port Has Blocked 134,000 Cyberattacks—and Kept Israel’s Trade Moving
  • Black Hat Asia 2026, April 23–24, Singapore
  • World Backup Day 2026: Why Recovery Has Become the Real Test of Cyber Resilience
  • Cyberhaven Launches Agentic AI Security as Shadow Agents Move Onto the Enterprise Endpoint
  • Palo Alto Networks Rewrites Security for the Agentic AI Era

Media Partners

  • Defense Market
  • Technologies.org
  • Technology Conferences
ATARS Meets the M-346: Why Leonardo and Red 6 May Be Rewriting the Logic of Fighter Training
Dark Eagle: The U.S. Army’s Long-Range Hypersonic Weapon, Brief Overview
The Army Just Launched a Solicitation for a Heavier ISV — Here’s What We Know
The ISV’s $308 Million Budget Request — and Why Congress Is Pushing Back
From Prototype to Full-Rate Production: The ISV’s Development Timeline
ISV Specs and Deployment: How the Army Gets This Vehicle Into a Fight
Meet the ISV: The Army’s Lightweight Vehicle Built for Speed Over Armor
Affordable Mass: DARPA’s Push for Cheap Missiles Signals a Doctrinal Reset in Modern Warfare
Cheap Wins Wars: America’s Late Turn Toward Cost-Asymmetric Weapons
From Scrap to Supremacy: 6K Additive’s $1.95M Bet on Rebuilding the U.S. Defense Material Base
Wayve’s $60 Million Extension Matters Because the Intelligence Stays on the Machine
Accenture Bets on Physical AI with General Robotics Investment
NanoTech Materials Raises $29.4 Million to Scale Energy-Saving and Fire-Resistant Coatings
Top 10 Emerging Technologies for 2026
The Machine That Thinks in Two Languages: Quantum Meets Supercomputing in Japan
Lightcast Raises $27 Million to Push Functional Single-Cell Analysis Toward the Lab Bench
TeraLink at 400 Gbps: X-lumin Pushes Free-Space Optics Into Core Infrastructure Territory
IonQ Connects Two Quantum Computers and Pushes Its Scaling Story Forward
nEye.ai’s $80 Million Bet on Optical Switching Is Really a Bet on the Shape of the AI Data Center
Coupang Bets Big on AI Robotics, Backs Texas Startup for Global Logistics Push
ENGAGE 2026, April 27–28, New York
NAB Show 2026, April 18–22, Las Vegas
VivaTech 2026, June 17–20, Porte de Versailles, Paris
Accelerate 2026, May 21–22, 2026, Salt Palace Convention Center
JSNation 2026, June 11 & June 15, Amsterdam and Remote
ICMC 2026, July 30–31, Long Beach
Elevate 2026, April 22–24, 2026, Atlanta
WWDC 2026, June 8–12, Cupertino & Online
Zip Forward Europe 2026, April 16, 2026, London
AI Summit: Operationalizing Intelligence and Driving Innovation, April 16, 2026, Woburn, Massachusetts

Media Partners

  • Market Analysis
  • Market Research Media
  • Analysis.org
Synera’s $40M Series B: What the Press Release Isn’t Saying
Amazon’s Globalstar Acquisition Is a Spectrum War Dressed as a Satellite Deal
The End of Manual Audits: Why AI-Native Accounting Is Not Optional Anymore
Raspberry Pi’s Earnings Beat Signals a Shift From Hobbyist Hardware to Embedded Infrastructure
Betting the Backbone: A Multi-Year Positioning on AMD, Broadcom, and Nvidia
Nvidia’s Groq 3 LPX: The $20B Bet That Could Define the Inference Era
Why Arm’s New AI Chip Changes the Rules of the Game
A Map Without Hormuz: Rewiring Global Oil Flows Through Fragmented Corridors
RoboForce’s $52 Million Raise Signals That Physical AI Is Moving From Demo Stage to Industrial Scale
The Hormuz Crisis: Winners and Losers in the Global Energy Shock
Canva Acquires Simtheory and Ortto to Build End-to-End Work Platform
Netflix Price Hikes, The Economics of Dominance in a Saturated Streaming Market
America’s Brands Keep Winning Even as America Itself Slips
Kioxia’s Storage Gambit: Flash Steps Into the AI Memory Hierarchy
Mamdani Strangling New York
The Rise of Faceless Creators: Picsart Launches Persona and Storyline for AI Character-Driven Content
Apple TV Arrives on The Roku Channel, Expanding the Streaming Platform Wars
Why Attraction-Grabbing Stations Win at Tech Events
Why Nvidia Let Go of Arm, and Why It Matters Now
When the Market Wants a Story, Not Numbers: Rethinking AMD’s Q4 Selloff
Cloudflare Shares Are Poised for a Jump — Here Is Why the Setup Is Compelling
Nvidia, AMD, and Broadcom Are Rising Again — and the Market Is Telling You Something
OPEC+ in a Blocked Market: Why 200,000 Barrels Don’t Matter
Oil Shock 2026: Hormuz Risk Premium Rewrites the Curve
Why ServiceNow, Salesforce, and Atlassian Fell on the Anthropic Mythos Announcement
Broadcom’s Quiet Power Play: Strong AI Tailwinds, Yet a Stock Caught Between Cycles
Nvidia’s AI Dominance Is Real—So Why Doesn’t the Stock Feel Untouchable?
The Cost of Winning AI: Why Microsoft’s Stock Is Stuck Between Growth and Doubt
Memory Market Reality Check: Micron’s Drop Ripples Across the Sector
The Rise of China’s Hottest New Commodity: AI Tokens

Copyright © 2022 CybersecurityMarket.com

Technologies, Market Analysis & Market Research, Photography