RSS feed logo header graphic

Black Hat Sustaining Sponsors

We are pleased to announce the following companies as Sustaining Sponsors for 2009.

The Black Hat Sustaining Sponsor Program aims to increase visibility for organizations who support the mission of Black Hat by committing in advance to sponsoring at least 3 Black Hat events in a calendar year. Sustaining Sponsors are called out in all conference materials and proceedings, and are included both on the main page of the Black Hat site and in a page devoted to Sustaining Sponsors that includes a 125-word description of the sponsor and photos of senior management. This designation lasts from the date of the agreement to the close of the next Black Hat USA event.

Interested in sponsorship opportunities? Contact us.

core security logo

Core Security Technologies helps organizations prove the effectiveness of their security investments in the face of ever-changing threats. The first automated penetration testing product for assessing specific information security risks, CORE IMPACT safely tests network vulnerabilities using a proven methodology.

Core Security also offers world-class consulting services for penetration testing and software security auditing. CORE IMPACT is the first automated, comprehensive penetration testing product for assessing specific information security threats to an organization. By safely exploiting vulnerabilities in your network infrastructure, the product identifies real, tangible risks to information assets while testing the effectiveness of your existing security investments.

Black Hat Sustaining Sponsor: IOActive

Established in 1998, IOActive has successfully positioned itself as an industry leader in the Northwest's computer security community, where it specializes in infrastructure assessment services, application security services, managed services, incident response services, and education services. The company has helped various Fortune 500 organizations with services ranging from enterprise risk management to independent technical validations of security hardware and a wide range of applications. It has also been commissioned to work on IT disaster recovery and business continuity planning for major insurance companies, state organizations and energy companies. IOActive's consultants are members and active contributors to local and nationally recognized computer security organizations such as SANS, Agora, CRIME, ISSA, CTIN, WSA, HoneyNet Research Alliance, OWASP, and the University of Washington Information Assurance School.

Joshua Pennell
Founder & President

Jennifer Steffens
General Manager

David Baker
Director of Services

Ward Spangenberg
Director of Penetration Testing

Dan Kaminsky
Director of PCI and Compliance

Black Hat Sustaining Sponsor: Microsoft

Microsoft is proud to be a continuing sponsor of the Black Hat Security conference. We appreciate Black Hat providing a unique forum in which security researchers from all over the world, IT Pros and industry luminaries can gather to share insights, knowledge and information to advance security research. 

Microsoft remains dedicated to software security and privacy and continues to collaborate with the community of people and technology organizations helping to protect customers and the broader ecosystem, Microsoft is also dedicated to software security and privacy.

Since the onset of Trustworthy Computing we have fostered a culture of security within Microsoft that includes developing secure code, building strong relationships with industry researchers and partners, and providing guidance to help protect customers. We would like to thank all of the customers, partners and security researchers who have worked with us to advance the state of the art in security science. Only by working together with partners, researchers and the community can we all ensure the advancement and success of the technology industry.

nitro security logo

Industry experts and analysts agree: the more information that you can manage, the better. However, most SIEM and log management solutions quickly bog down when asked to monitor, store, correlate and analyze every relevant data source on your network. NitroSecurity uses unique, patented technology to blow away the performance barriers that prevent information security analysts from gaining total visibility to their infrastructure.

core security logo

Norman Data Defense Systems is the US subsidiary of leading European security vendor Norman ASA. Based in Washington, DC and San Francisco, Norman DDS offers the complete Norman portfolio, which includes analysis tools and solutions for malware, spyware, spam, and phishing as well as a desktop firewall. Through its Norman SandBox technology, Norman leads the way in the world of proactive anti-virus solutions. The company is anticipating dynamic growth in 2008 and beyond with the addition of some exciting new products and the expansion of its current partner network. To learn about these new products visit To find out more about the company, visit Norman Data Defense Systems on the Internet at

qualys logo

Qualys, Inc. is the leading provider of on demand IT security risk and compliance management solutions – delivered as a service. Qualys’ Software-as-a-Service solutions are deployed in a matter of hours anywhere in the world, providing customers an immediate and continuous view of their security and compliance postures. The QualysGuard® service is used today by more than 3,500 organizations in 85 countries, including 40 of the Fortune Global 100 and performs more than 200 million IP audits per year. Qualys has the largest vulnerability management deployment in the world at a Fortune Global 50 company. Qualys has established strategic agreements with leading managed service providers and consulting organizations including BT, Etisalat, Fujitsu, IBM, I(TS)2, LAC, SecureWorks, Symantec, Tata Communications, TELUS and VeriSign. For more information, please visit

1997-2009 Black Hat ™