
Meet With Us
Meet with us at our Mandalay Bay Presidential Suite, or book a meeting now.
Tuesday, August 6th | 8:30 AM – 3:30 PM PT
Wednesday, August 7th | 10:30 AM – 6:30 PM PT
Thursday, August 8th | 8:30 AM – 11:30 AM PT
Synack Exclusive Events at Black Hat
Whiskey Tasting Reception
Tuesday, August 6 | 6:00 pm – 10:00 pm PT
Take in the views of the Las Vegas strip where connoisseurs and enthusiasts can savor a curated selection of rare and premium whiskeys.
Women In Cyber Networking | Meet & Greet
Wednesday, August 7 | 8:30 am – 10:00 am PT
The Women in Cybersecurity Networking Meet & Greet provides a platform for women in the cybersecurity field to expand their network, share knowledge, and empower each other.
Notable Capital Reception
Wednesday, August 7 | 6:00 pm – 8:30 pm PT
You can expect delicious drinks and light bites to enjoy while socializing with fellow cybersecurity professionals.

Visit our strategic partners booth #1468 – Devo
They’ll have a photographer on hand to take free, professional headshots.
Dress in your best and swing by to get a new LinkedIn photo.
The Team at Black Hat

Bill Hogan
CRO
Hogan brings more than 30 years of Industry experience to CyberMaxx, gained through a successful career including roles at EMC, StorageApps, acquired by HPE, NetApp, Fortinet and SecurityScorecard.
Learn More
Aaron Shaha
CISO
Aaron Shaha, CISO at CyberMaxx is a Strategic Information Security Executive and subject matter expert with a record of pioneering cyber security trends
Learn More
John Pinkham
Sr. Director, Strategic Alliance Partners & Sales Enablement
John Pinkham is the Sr. Director, Strategic Alliance Partners & Sales Enablement at CyberMaxx.
Learn More
Jarod Thompson
Director of Engineering
Experienced Senior Solutions Engineer with a demonstrated history of working in the computer and network security industry.
Learn More
Threat Hunting Done Right
Breaking through industry misconceptions and identifying emerging threats systematically
The security vendor community often makes this confusing by using the term to describe things that aren’t truly threat-hunting so we’ve published this guide to provide a clear understanding of what threat hunting is and what it isn’t.