Past Event: Wednesday May 8, 2024
Bishop Fox RSAC 2024 Livestream
Join us for our 2nd Annual Bishop Fox RSAC Livestream event - an electrifying convergence where innovation meets expertise in the realm of cybersecurity.
Past Event: Wednesday May 8, 2024
Managing SaaS Sprawl: Building Security Into Your Multi-Vendor Ecosystem
Marketing executive Charrah Hardamon reveals practical approaches for gaining visibility and control over increasingly complex vendor ecosystems, helping security teams balance innovation speed with appropriate risk management.
Past Event: Wednesday May 8, 2024
Beyond Technical Exploits: The Strategic Value of Red Team Engagements
Security researcher John Hammond reveals how effective red teaming transcends technical prowess to drive meaningful security improvements through collaboration between offensive and defensive teams, helping organizations prioritize investments that truly reduce risk.
Past Event: Wednesday, May 8, 2025
Speaking Board Language: Translating Cybersecurity for Executive Leadership
McKinsey cybersecurity leaders reveal practical strategies for communicating complex security challenges in business terms that resonate with boards and executive stakeholders, helping security leaders gain the support and resources they need.
Past Event: Wednesday May 8, 2024
AI's Dark Potential: Robert Hansen, RSnake and Author of AI's Best Friend, Warns of Superintelligence Risks
Security pioneer Robert "RSnake" Hansen shares insights from his book "AI's Best Friend," revealing why artificial intelligence without moral frameworks poses unprecedented dangers that regulation alone cannot address.
Past Event: Wednesday May 8, 2024
Intelligence That Matters: Building Cyber Threat Programs That Drive Business Value
Intelligence veterans reveal how to transform technical security findings into business-relevant insights that drive meaningful action at the executive level, helping security teams demonstrate clear value in today's complex risk landscape.
Past Event: Wednesday May 8, 2024
The Human Element: Building Trust and Influence in Security Leadership
Security expert Nate Lee reveals how psychological principles and relationship-building can transform security program effectiveness, helping practitioners move beyond technical solutions to create lasting organizational change.
Past Event: Wednesday May 8, 2024
Beyond Whack-a-Mole: Modern AppSec Strategies for High-Growth Companies
Security leaders from Reddit, Meta, and SeatGeek reveal how they've transformed application security from a reactive vulnerability hunt into a seamless part of the development process, creating secure environments that maintain development velocity.
Past Event: Wednesday May 8, 2024
The Human Side of Security Leadership: Building Teams That Thrive
Veteran security leader Dave Lewis shares how empathy, communication, and empowerment transform struggling teams into high performers, offering practical wisdom for technical experts transitioning to leadership roles.
Past Event: Mon, May 6, 2024 – Thu, May 9, 2024
Navigating the IAM Maze: Expert Strategies for Cloud Identity Security
Security leaders from P0 Security and Sphere discuss how organizations can better manage the explosion of digital identities in complex cloud environments, with special focus on often-overlooked machine identities that now vastly outnumber human users.
Past Event: Thursday, April 25
Mitigate Third-Party Risks by Strengthening Security Foundations
Hear from Anirban Banerjee, CEO and Co-founder of Riscosity, and Matt Twells, Sr. Solution Architect at Bishop Fox, as they explore critical considerations for developing a security program that prioritizes third-party risk reduction.
Past Event: Wednesday, March 27, 2024 at 2pm ET / 11am PT
Women in Cybersecurity: Breaking Codes, Breaking Barriers
Tune into our special livestream event where we highlight the remarkable achievements of women in the field of cybersecurity, celebrating their contributions during Women's History Month.
Past Event: Thursday, March 21, 2024
Beyond Checkbox Compliance: Maximizing Security Value from PCI DSS Penetration Testing
Security Consultant Derek Rush shares how organizations can transform mandatory PCI penetration tests from compliance exercises into meaningful security assessments by following industry guidance and adopting attacker-focused methodologies.
Past Event: Tuesday, February 22, 2024
Exploiting Java Deserialization in GWT: From Detection to Command Execution
Security expert Ben Lincoln reveals a critical vulnerability in the Google Web Toolkit (GWT) that allows attackers to compromise Java web applications through deserialization attacks—even when authentication is required.
Past Event: Thursday, February 1, 2024
A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements
Understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future trends.
Past Event: Wednesday, January 17, 2024
How Does Social Engineering Work? From Planning to Execution
Security expert Dardan Prebreza reveals the sophisticated techniques behind modern social engineering attacks—from initial reconnaissance to exploitation—and provides actionable strategies to strengthen your organization's human security layer.
Past Event: On Demand
Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth
Uncover how purple teaming can transform cybersecurity from a perceived cost center to a revenue-protecting asset. Ryan Basden, Red Team security consultant, will guide you through establishing security baselines, validating investments, and formulating a roadmap for growth.
Past Event: Tuesday, November 14, 2023 at 11am PT / 2pm ET
OWASP ASVS: Unlocking Stronger Application Security
Join offensive security expert Shanni Prutchi in this livestream as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard (ASVS). Learn how to generate test cases and gain insights to effectively test your applications against the standard.
Past Event: Thursday, November 9, 2023 at 11 am PT / 2 pm ET
Pragmatic AI & LLM Security Mitigations for Enterprises
Immerse yourself in the vibrant world of AI and Language Learning Models (LLMs) in our webinar presented in collaboration with industry leaders from Moveworks.
Past Event: On-Demand Virtual Session
Combatting Adversaries: Proactive Social Engineering & Network Testing
Dive deep into the trenches of internal network testing, demonstrating how it can be weaponized to impede unauthorized maneuvers within your systems, effectively reducing your attack surface.
Past Event: Friday, August 11, 2023 from 10 am to 2 pm PT
Hacker Evolution: From Technical Mastery to Visionary Leadership
Join us for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the boundaries of technology.
Past Event: Friday, August 11, 2023
Offensive Security Arsenal: Building and Mastering Custom Security Tools
In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of the most elite organizations worldwide.
Past Event: Friday, August 11, 2023
Cloud Attack Vectors: Expert Techniques for Finding Critical Vulnerabilities
In this session, we explore cloud vulnerabilities. Hear how experts uncover misconfigurations and exploit cloud-based environments.
Past Event: Thursday, June 29, 2023 at 11 am PT / 2 pm ET
Breaking Down Q2's Critical CVEs: From Discovery to Exploitation
Watch the third episode of our What the Vuln technical series as we share the most intriguing vulnerabilities that we encountered in Q2 2023 and how we hacked them.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.