AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Virtual and In-Person Events

Let's connect at an upcoming event!

We actively contribute to and participate in the cybersecurity community. Come see us at an upcoming industry event or tune into one of our speaking gigs, past or present!

Cybersecurity workshop graphic “Building Tools: What, When, and How” highlighting practical guidance on when and how to build security tools.
Workshop & Training

Past Event: Wednesday, February 18

Building Tools: What, When, and How

Surrounded by security tools but still tempted to “just build it”? This hands-on workshop breaks down when custom tooling is worth it, when it’s not, and how to build fast, focused tools without…

Learn More
Sliver Framework tool Workshop Part 3 Building Better Encoders workshop graphic with big head in background.
Workshop & Training

Past Event: Tuesday, December 9

Sliver Workshop Part 3: Building Better Encoders

In our third Sliver workshop, we explore how Sliver handles traffic encoding by default and how attackers can extend its capabilities with custom Wasm-based encoders. We dive into Sliver’s encoder…

Learn More
Demystifying 5G Security: Understanding the Registration Protocol — virtual workshop by Bishop Fox exploring 5G registration fundamentals, security gaps, and real-world vulnerabilities.
Workshop & Training

Past Event: Thursday, October 16

Demystifying 5G Security: Understanding the Registration Protocol

In this hands-on workshop, Senior Security Consultant Drew Jones will break down the fundamentals of the 5G registration protocol, explore where security gaps can emerge, and walk through a live…

Learn More
CloudFox workshop on cloud enumeration techniques for penetration testing.
Workshop & Training

Past Event: October 1st, 2025

CloudFox: Cloud Enumeration for Penetration Testing

In this session, Mitchell Sperling, Senior Security Consultant at Bishop Fox, will demonstrate how he uses CloudFox during cloud penetration tests to quickly enumerate large cloud environments and…

Learn More
Bold graphic with black background promoting a Sliver Framework workshop titled 'Sliver: Staging & Automation'; features white and neon yellow text, Sliver logo in a white box, and digital glitch-style accents in magenta, cyan, and yellow on the edges.
Workshop & Training

Past Event: July 9, 2025

Sliver Workshop Part 2: Staging & Automation

In our second workshop, we’ll explore Sliver’s new implant staging process and demonstrate basic CLI automation features. We’ll also walk through Sliver’s supported pivot types for lateral movement,…

Learn More
Sliver Framework Getting Started and 1.6 Features Event image with Bishop Fox branding.
Workshop & Training

Past Event: May 8, 2025

Sliver Workshop Part 1: Getting Started & 1.6 Features

Watch an interactive Discord workshop led by Bishop Fox Senior Security Consultant, Tim Ghatas, as we dive into Sliver, the open-source C2 framework making waves in Red Team ops.

Learn More

Subscribe to our blog

Be first to learn about latest tools, advisories, and findings.

Headshot with Alissa Gilbert and livestream title, "Come WiFind Me"
Workshop & Training

Past Event: Wednesday, June 26

Come WiFind Me: WiFi & Other RF Surveillance

Join Alissa Gilbert (dnsprincess) as she dispels myths around RF tracking, negates some fears, and gives completely new ones in its place.

Learn More
2025 Q1 Video RVA Sec2024 Patch Perfect
Workshop & Training

Past Event: June, 3rd, 2025

Patch Perfect: Harmonizing with LLMs to Find Security Vulns

This talk led by Bishop Fox researchers Caleb Gross & Josh Shomo cuts through the hype and offers a practical perspective that’s grounded in real-world analysis of critical bugs in widely used…

Learn More
Cloud Security Podcast Interview3
Workshop & Training

Past Event:

CloudFoxable: A Practical Demo of AWS Cloud Security Misconfiguration Attacks

This practical demonstration features Bishop Fox security expert Seth Art showcasing CloudFoxable, an open-source AWS security training tool that simulates real-world cloud security misconfigurations.

Learn More

Ready to Get Started? Let's Connect.

Get Started

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.