We actively contribute to and participate in the cybersecurity community. Come see us at an upcoming industry event or tune into one of our speaking gigs, past or present!
Past Event: Friday, March 1, 2024
Workshop: Upgrade Your Job Search with AI
Dive into the world of AI-driven job searching with @Kaitlin O'Neil! Join us for a Discord exclusive workshop on March 1 for an in-depth exploration of ChatGPT and other AI tools.
Past Event: February 28th, 2025
The Zero-Day Arms Race: Why Asset Management Trumps Vulnerability Whack-a-Mole
Security expert Caleb Gross explains how the rapid exploitation of Ivanti VPN vulnerabilities demonstrates why organizations need a fundamental shift in how they approach emerging threats—moving…
Past Event: Tuesday, February 22, 2024
Exploiting Java Deserialization in GWT: From Detection to Command Execution
Security expert Ben Lincoln reveals a critical vulnerability in the Google Web Toolkit (GWT) that allows attackers to compromise Java web applications through deserialization attacks—even when…
Past Event: Friday & Saturday, February 16-17, 2024
Bishop Fox Presents at CactusCon 12
Bishop Fox is proud to present at the CactusCon 12 from February 16-17, 2024. Several Foxes will be presenting on a variety of topics including: Kaitlin O'Neil (Recruiting Manager), Alissa Gilbert…
Past Event: Thursday, February 15, 2024
Rob Ragan to Speak at Boston Security Meetup
We’re excited to share that Rob Ragan will be speaking at the Boston Security Meetup this February. Looking forward to great conversations with the local security community!
Past Event: Thursday, February 1, 2024
A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements
Understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future…
Past Event: Tuesday, January 30, 2024 at 2pm ET / 11am PT
Sliver Mastery: Dominating Active Directory Through Advanced Trust Exploitation
Security expert John Guylde demonstrates sophisticated techniques for escalating from domain user to Enterprise Admin using the Sliver C2 framework. Learn how to leverage Kerberos delegation, trust…
Past Event: Wednesday, January 17, 2024
How Does Social Engineering Work? From Planning to Execution
Security expert Dardan Prebreza reveals the sophisticated techniques behind modern social engineering attacks—from initial reconnaissance to exploitation—and provides actionable strategies to…
Past Event: January 9th, 2024
What Unpatched Vulnerabilities Reveal: A Red Teamer's Perspective by Trevin Edgeworth, Director of Red Team
Red Team Practice Director Trevin Edgeworth explains how attackers use long-standing vulnerabilities as intelligence about an organization's security maturity, helping them craft more effective and…
Ready to Get Started? Let's Connect.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.