Bishop Fox at BSides Mexico 2025
- Date:
- Friday, July 18, 2025
- Location:
- BSides Mexico | Mexico City, MX

We're proud to support our community in Mexico as a Silver Sponsor of BSides Mexico City 2025! Join Bishop Fox consultants throughout the day for hands-on workshops and real-world insights covering cloud security, mobile app bypass techniques, and lessons from high-stakes incident response cases.
Workshop: Cloud Pentesting 101 – How to Survive in the Clouds
Speaker: Juan Jasso, Security Consultant II
Time: 11:00 AM – 1:00 PM EST
Kick off your day with a hands-on, beginner-friendly workshop on cloud security assessments. Juan Jasso will walk attendees through identifying and exploiting vulnerabilities in a custom AWS environment using the Cloudfoxable learning platform and Cloudfox, Bishop Fox’s open-source cloud enumeration tool.
What You’ll Learn:
- Core concepts of cloud security testing
- Using Cloudfox and Cloudfoxable in assessments
- Common misconfigurations and how attackers exploit them
- Hands-on practice through real-world challenges
Whether you're just getting started in cloud security or want to sharpen your skills, this session is for you.
Workshop: Burning Down the Walls – Bypassing Security Methods on Android and iOS
Speakers: Luis de la Rosa & Steeven Rodriguez, Bishop Fox
Time: 1:00 PM – 3:00 PM EST
In this advanced mobile security workshop, Luis and Steeven will demonstrate how to identify and bypass root and jailbreak detection mechanisms on Android and iOS. Attendees will explore both manual and automated techniques using tools like Objection, and learn how to script their own bypasses while understanding the underlying technologies.
What You’ll Learn:
- Techniques for bypassing root/jailbreak detection
- Using Objection and scripting custom bypasses
- How mobile apps implement (and fail at) these controls
Talk: Looking Back, Containing Chaos – Lessons from Real-World Intrusions
Speaker: Abdel Bolivar, Bishop Fox
Time: 6:00 PM – 7:00 PM EST
Wrap up the day with Abdel Bolivar as he walks through high-impact incidents he’s investigated—from attacks on financial systems to cryptojacking campaigns in enterprise networks. This session distills key lessons on detection gaps, response missteps, and what defenders got right during critical moments.
What You’ll Learn:
- Real-world case studies including the SPEI compromise and ATM fraud
- Common pitfalls in detection and response
- Practical takeaways for improving your incident response playbook