Lacework at Black Hat 2022 - Lacework

Visit Lacework at Black Hat 2022

Booth #2440, Mandalay Bay
August 9-11, 2022 | Las Vegas, NV

Black Hat 2022
Black Hat 2022

See how your cloud security can deliver up to 342% ROI

Connect with Lacework

Connect with Lacework

Stop by booth #2440 and see Lacework in action.

Wednesday, August 10 – 10:00am – 7:00pm
Thursday, August 11 – 10:00am – 5:00pm

  • Meet 1:1 with a cloud security expert
  • Engage in a product demonstration
  • Learn about the power of our Polygraph® Data Platform by stopping by our juice bar and enter for a chance to win a custom pair of Air Force 1 shoes
Schedule a meeting
Learn with Lacework

Learn with Lacework

Hear from Lacework leaders as they offer insights and best practices to shine a light on the true risk of your cloud.

Trace Me if You Can: Bypassing the Linux Syscall Tracing

Rex Guo, Principal Engineer

In this talk, we will present novel vulnerabilities and exploitation techniques that reliably bypass Linux syscall tracing. A user mode program does not need any special privileges or capabilities to reliably avoid system call tracing detections by exploiting these vulnerabilities. The exploits work even when seccomp, SELinux, and AppArmor are enforced.

  • Date:  Wednesday, August 10
  • Time:   4:20pm-5:00pm
See Full Agenda
Networking Opportunities

Networking Opportunities


Join the cybersecurity colleagues and peers at the Skyfall Lounge. Enjoy cocktails and appetizers as we kick-off the 2022 Black Hat Conference on Tuesday night with our security sponsors.

Tuesday, August 9
5:30pm-7:30pm

Skyfall Lounge at Mandalay Bay/Delano

RSVP Today!
Join Cyberwatch & Lacework Back to 90’s Event

Join Cyberwatch & Lacework Back to 90’s Event

Enjoy cocktails and appetizers on Wednesday night with our security sponsors.

  • Wednesday, August 10
  • Doors open at 7pm
  • Rockstar Bar
RSVP Today!

Schedule a demo with a Lacework expert

Meet with Lacework at Black Hat 2022 to learn how we are helping organizations go further, faster, in securing cloud native applications. With our behavioral based threat detection security solution our customers are securing their cloud environments end to end as they build out their applications.

Get a demo to see our cloud security platform in action by filling out the form.