Methodology: We collected most relevant posts on LinkedIn talking about Black Hat Europe 2025 and created an overall summary only based on these posts. If you´re interested in the single posts behind, you can find them here: https://linktr.ee/thomasallgeyer. Have a great read!
AI and GenAI Security
OWASP Agentic AI Top 10 and OWASP GenAI initiatives anchor AI security as a central theme for practitioners
AI Security Summit content links AI risks to real world infrastructure and resilience questions, including London focused scenarios
Autonomous AI attacks and defensive strategies move into the mainstream agenda through dedicated sessions and discussions
Training on Traditional versus Generative AI pentesting and AI Red Teaming highlights demand for repeatable, hands on offensive skills
Arsenal demos such as open source AI security tools, AI threat modelling assistants and Cloud Sec AI Bot show AI used as both target and defender
Trustworthy AI, GenAI safety standards and data visibility narratives position AI security as a cross cutting requirement for modern cyber programs
Offensive Security, Hardware Hacking and Deep Research
Kubernetes Red Team framework KubeShadow illustrates sustained focus on attacking cloud native and containerised environments
Hardware hacking stands out with PwnPad learning platforms, card present payment security and dedicated research on payment hardware
Research on CVE decentralisation and encrypted traffic analysis shows interest in systemic weaknesses and protocol behaviour
Mainframe related posts and advanced tooling such as ioctlhammer extend research from legacy platforms to cutting edge exploit techniques
Attendee reflections describe offensive cybersecurity as rapidly evolving, with AI driven attacks and defences increasingly visible
Software Supply Chain, Mobile and Cloud Security
DepConfuse and SupplyShield bring software supply chain risks to the fore, especially dependency confusion and CI or CD native controls
Vendors emphasise integrated software supply chain security solutions at their booths, signalling strong commercial momentum
Real time API interception in MDM locked mobile apps connects enterprise device management with mobile application security
Cloud and AI security trainings underline how cloud threats and AI related risks are now tightly intertwined
High fidelity data demonstrations for anomaly detection link telemetry quality with faster and more confident security decisions
Managed Detection, SOC and Operational Resilience
Black Hat NOC coverage showcases the event network as a live high security environment with visible operations and procedures
Participation from major vendors in the NOC underscores their role in protecting complex networks and demonstrating real capabilities
Workflows, apps and ticketing for automated investigations target more integrated SOC operations and reduced manual overhead
Next Gen MDR narratives combine adaptive AI with managed services to accelerate detection and provide richer context for incidents
Distributed Acoustic Sensing for fibre and physical assets shows monitoring extending across both logical and physical infrastructure layers
Sector, Policy and Ransomware Perspectives
UK cyber policy sessions highlight Black Hat Europe as a bridge between practitioners, regulators and government stakeholders
Financial focused tracks link cybersecurity, quantum resistant cryptography and integrated fraud and cyber risk management for banks and insurers
Trend reviews emphasise trust dynamics in ransomware ecosystems, AI related risks and the drag from legacy systems on resilience
Reflections on teenagers seeking fame as attackers add nuance to threat actor motivation and influence defence priorities
Ecosystem, Startups, Branding and Business Community
Business Hall impressions describe dense clusters of data security, AI security and software supply chain offerings across the show floor
Networking events and executive gatherings for go to market leaders focus on pipeline health, AI infused offerings and practical sales strategies
Geordie AI winning Startup Spotlight reinforces the prominence of AI native startups in the conference innovation narrative
Branding and storytelling sessions treat positioning and narrative as strategic levers for cybersecurity companies, not afterthoughts
Comparisons with other industry events highlight Black Hat’s perceived strengths in technical depth, layout and content organisation
Talent, Diversity, Training and Individual Journeys
Scholarships and first time attendee programmes open access to briefings, labs and community building for new voices in cybersecurity
Women in cybersecurity networking and visible female leadership support a more diverse talent pipeline and role model set
Intensive courses on topics such as cyber investigative interviewing, AI Red Teaming and cloud security position the event as a high impact training hub
Volunteering experiences and early career stories present Black Hat Europe as a place to grow skills, expand networks and test new ideas in practice
Many participants report leaving London energised, better connected and equipped with concrete AI, cloud and security insights for day to day work

