2-7 AUGUST
Experience the NEW Cymulate Threat Resilience Platform.
Black Hat
USA 2025
Booth
1640
Mandalay Bay
Why Visit Us?
Demo Our New Threat Resilience Platform
Wondering if your security stack works against threats that matter most? We can help you prove it. Try our NEW platform to understand and improve your overall threat resilience.
Schedule a personalized demo.
Meet the Experts
Come say “hi” and meet our team of cybersecurity experts. We’ll be ready to answer your questions, share prescriptive guidance and help you optimize your defences.
Book a meeting with us, now!
Catch a Live Speaking Session
Come to our booth to learn about our latest technology offerings, expert insights from our product team, best practices and strategies that can work for your specific needs.
Compete in Our Live "Capture the Flag"!
Join MCPwned — Cymulate’s live CTF at Booth 1640. Tackle real AI attack paths, win prizes, and prove your skills in the Model Context Protocol showdown!.
Get started here
BOOTH Presentations Agenda
Wednesday, August 6th
Topic: AI and threat Resilience
Title: Prove It Like a Pro: AI’s Role in Offensive Security & Exposure Management
Speaker: Brian Moran, VP of Product Marketing
Time: 10:30am
Abstract: Does your offensive testing need an assist? From scoping your first assessment to validating SIEM detections to building custom attack chains, learn how Cymulate applies AI to make exposure validation easy, so you can prove and optimize your threat resilience.
Topic: Cloud Security Validation
Title: Cloud Security Validation Essentials
Speaker: Nir Krumer, VP of Product
Time: 11:30am
Abstract: Tune and optimize your cloud security controls before the next attack. Put your cloud-native security controls to the test to validate the effectiveness of GuardDuty, Defender for Cloud and Security Command Center. Learn how Cymulate uses production-safe attack emulation to prove detection and prevention – while providing the detection rules and mitigation for any security gaps.
Topic: Exposure Prioritization & CTEM
Title: Focus on the Exploitable: Evidence-Based Exposure Prioritization
Speaker: Roi Sharon, Director of Product Management
Time: 12:30pm
Abstract: Apply proof and evidence of your threat resilience to prioritize the exposures that are actually exploitable. Stack-rank thousands of CVEs and other exposures based on proof and evidence. Learn how Cymulate prioritizes your threat exposure with correlation:
- Proven threat prevention and/or threat detection
- Threat intelligence for known exploits, threat actors and active campaigns targeting your industry
- Business context and asset criticality
Topic: SentinelOne
Title: Continuous Security Optimization with SentinelOne and Cymulate
Speakers: Brian Reed, Senior Director of Sales Engineering and Wesley Finch, SentinelOne Solutions Engineer
Time: 1:30 PM
Abstract: You’ve invested in the market-leading endpoint security. Now, take the next step to continuously validate and optimize security. Take a proactive approach with real outcomes of reduced threat exposure to rapidly apply threat updates and optimize detection logic with this joint solution from SentinelOne and Cymulate.
Topic: MCP exploits and abuse
Title: LLM Security Validation & MCPWN’d CTF
Speakers: Sasha Gohman, VP of Research and Rotem Kama, Deputy VP Research
Time: 2:30pm
Abstract: As large language models become integrated into core workflows, new assumptions about context, memory and model behavior introduce unseen risks. In this session, the Cymulate Research Labs will unveil two critical vulnerabilities in Anthropic’s Filesystem MCP Server (CVE-2025-53109 & CVE-2025-53110) that enable privilege escalation and prompt-state hijacking. They’ll walk through the technical details, explore the broader implications for AI security validation and demonstrate how these weaknesses challenge current trust models in LLM deployments. To bring these concepts to life, the team has built a live Capture the Flag competition where participants exploit the same vulnerabilities. Join us to rethink what it means to secure AI systems, starting with the protocols they rely on.
Topic: Detection Engineering
Title: Detection Engineering: Build, Test & Deploy with Automation and AI
Speaker: Aris Bega, Security Architect
Time: 3:30pm
Abstract: Security teams today are drowning in alerts, struggling to distinguish true threats from background noise. Explore how Cymulate detection engineering uses automation, contextualization and continuous validation to reduce alert fatigue, improve detection accuracy and empower SOC teams to stay ahead of adversaries, confidently.
Topic: Red Teaming
Title: Steel Sharpens Steel: Optimize Your Cyber Resilience with Automated Red Teaming
Speaker: Jess Redd, Security Architect
Time: 4:30pm
Abstract: Cyber resilience requires more than building strong defenses. We must test those defenses to continuously improve cyber security. Learn how to automate your next red teaming exercise with intelligence of adversarial exposure validation.
Thursday, August 7th
Topic: Findings from Cymulate research report
Title: The True State of Exposure Management … according to 1,000 CISOs
Speaker: Brian Reed, Senior Director of Sale Engineering
Time: 10:30am
Abstract: How do you spell proactive security? Many spell it CTEM for continuous threat exposure management. Learn what 1,000 CISOs had to say about exposure management and how they apply continuous validation to build threat resilience.
Topic: Exposure Prioritization & CTEM
Title: Focus on the Exploitable: Evidence-Based Exposure Prioritization
Speaker: Roi Sharon, Director of Product Management
Time: 11:30am
Abstract: Apply proof and evidence of your threat resilience to prioritize the exposures that are actually exploitable. Stack-rank thousands of CVEs and other exposures based on proof and evidence. Learn how Cymulate prioritizes your threat exposure with correlation:
- Proven threat prevention and/or threat detection
- Threat intelligence for known exploits, threat actors and active campaigns targeting your industry
- Business context and asset criticality
Topic: Exposure Validation for Zero Trust
Title: The Blind Spot in Zero Trust: Exposure Validation as the CISO’s Reality Check
Speakers: Amanda Kegley, Product Marketing Manager
Time: 12:30pm
Abstract: Zero Trust has become the gold standard for modern cybersecurity architecture, but implementation alone doesn't guarantee security. Most organizations rely on static controls and theoretical policies without validating whether they truly prevent breach impact, lateral movement, or privilege escalation. This session reveals how the Cymulate Threat Resilience Platform fills this critical gap with automated exposure validation, providing CISOs with continuous, real-world evidence of control effectiveness. Discover how to operationalize your zero trust technologies and policies with threat-informed validation strategies that turn Zero Trust from concept to threat resilience.
Topic: Red Teaming
Title: Steel Sharpens Steel: Optimize Your Cyber Resilience with Automated Red Teaming
Speaker: Jess Redd, Security Architect
Time: 1:30pm
Abstract: Cyber resilience requires more than building strong defenses. We must test those defenses to continuously improve cyber security. Learn how to automate your next red teaming exercise with intelligence of adversarial exposure validation.
Topic: Detection Engineering
Title: Detection Engineering: Build, Test & Deploy with Automation and AI
Speaker: Aris Bega, Security Architect
Time: 2:30pm
Abstract: Security teams today are drowning in alerts, struggling to distinguish true threats from background noise. Explore how Cymulate detection engineering uses automation, contextualization and continuous validation to reduce alert fatigue, improve detection accuracy and empower SOC teams to stay ahead of adversaries, confidently.
BOOK A MEETING WITH US
New threats emerge every day, each capable of breaching your defenses in a unique and sophisticated way. Are you confident that your business can withstand an attack – or recover from one? Cymulate can help.
Book a meeting with us to understand and improve your overall threat resilience. We can help you streamline key areas of your security operations so you’re ready to withstand an attack, and have a plan in place to recover, fast. Schedule your personalized meeting today to learn how to improve your threat resilience – and your business resilience.