Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Virtual and In-Person Events

Let's connect at an upcoming event!

We actively contribute to and participate in the cybersecurity community. Come see us at an upcoming industry event or tune into one of our speaking gigs, past or present!

Black and dark purple background with speaker headshot on left side. Teal background in speaker headshot. White and teal letters.
Virtual Session

Past Event: Tuesday, February 22, 2024

Exploiting Java Deserialization in GWT: From Detection to Command Execution

Security expert Ben Lincoln reveals a critical vulnerability in the Google Web Toolkit (GWT) that allows attackers to compromise Java web applications through deserialization attacks—even when…

Learn More
Headshot of main speaker: Matt Twells, Senior Solutions Architect and title of webcast: Pacemakers to Pacesetters.
Virtual Session

Past Event: Thursday, February 1, 2024

A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements

Understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future…

Learn More
Headshot of Dardan Prebreza, senior security consultant and webcast title: "How does social engineering works? From planning to execution"
Virtual Session

Past Event: Wednesday, January 17, 2024

How Does Social Engineering Work? From Planning to Execution

Security expert Dardan Prebreza reveals the sophisticated techniques behind modern social engineering attacks—from initial reconnaissance to exploitation—and provides actionable strategies to…

Learn More
Webcast title: Purple Teaming for Security Success with headshot of speaker, Ryan Basden.
Virtual Session

Past Event: On Demand

Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth

Uncover how purple teaming can transform cybersecurity from a perceived cost center to a revenue-protecting asset. Ryan Basden, Red Team security consultant, will guide you through establishing…

Learn More
Purple gradient background with headshot of speaker on left side.
Virtual Session

Past Event: Tuesday, November 14, 2023 at 11am PT / 2pm ET

OWASP ASVS: Unlocking Stronger Application Security

Join offensive security expert Shanni Prutchi in this livestream as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard (ASVS).…

Learn More
Video thumbnail featuring the three panelists and the title of the fireside chat on dark brackground.
Virtual Session

Past Event: Thursday, November 9, 2023 at 11 am PT / 2 pm ET

Pragmatic AI & LLM Security Mitigations for Enterprises

Immerse yourself in the vibrant world of AI and Language Learning Models (LLMs) in our webinar presented in collaboration with industry leaders from Moveworks.

Learn More
Red Teaming webcast title with headshot of speaker, Trevin Edgeworth, Red Team Practice Director.
Virtual Session

Past Event: Tuesday, October 24, 2023 at 11 am PT / 2 pm ET

Red Teaming: The Essential Tool for Security Leaders

Join Trevin Edgeworth, Red Team Practice Director at Bishop Fox, as he sheds light on why Red Teaming has become the ultimate "sanity check" for security team leaders.

Learn More
Title of the webcast plus the headshots of the four speakers.
Virtual Session

Past Event: On-Demand Virtual Session

Combatting Adversaries: Proactive Social Engineering & Network Testing

Dive deep into the trenches of internal network testing, demonstrating how it can be weaponized to impede unauthorized maneuvers within your systems, effectively reducing your attack surface.

Learn More
The Art of Hacking neon logo on dark background.
Virtual Session

Past Event: Friday, August 11, 2023 from 10 am to 2 pm PT

Hacker Evolution: From Technical Mastery to Visionary Leadership

Join us for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the…

Learn More

Ready to Get Started? Let's Connect.

Get Started

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.