Join us for a live webcast with industry experts to learn how newly proposed cybersecurity regulations will impact you. Register Now ›
We actively contribute to and participate in the cybersecurity community. Come see us at an upcoming industry event or tune into one of our speaking gigs, past or present!
Past Event: October 6-7, 2022
Bishop Fox to Sponsor CTF and Present at IPN Security Congress
Join Bishop Fox at ESIME, Culhuacán in Mexico City as we proudly sponsor the Capture the Flag (CTF). Attend our session on how to become a "professional" hacker.
Past Event: September 30 at 1:30 PM
Senior Security Consultant Alethe Denis is set to speak at Converge Security Conference
Senior Security Consultant Alethe Denis is set to speak at Converge Security Conference on how we can make our organizations more secure and ultimately reduce risk.
Past Event: September 23 at 1:35 PM
Joe DeMesy to Present at LABSCon 2022
Joe DeMesy will be discussing his offensive security tool Sliver at LABSCON in late September 2022!
Past Event: September 16-18
Bishop Fox to Sponsor CircleCityCon 9.0
We are proud to sponsor CircleCityCon 9.0, Indianapolis's Information Security Conference (with free trainings!)
Past Event: August 27, 2022 from 8 am-5:30 pm ET
Meet Bishop Fox at BSides Atlanta
Bishop Fox is proud to be a sponsor at this year's BSides Atlanta, being held in person.
Past Event: On-Demand
Watch a Special Livestream From DEF CON 30
Watch the lineup of leaders & influencers from the infosec community who joined us live at DEF CON 30!
Past Event : 08/11/2022
Bishop Fox at DEF CON 30
Bishop Fox is excited to livestream from DEF CON 30 and is a proud village sponsor.
Past Event : 08/09/2022
Tom Eston and Yael Basurto to Present at BSides Las Vegas
Bishop Fox AVP of Consulting, Tom Eston, will share his knowledge of how to be a better manager and build a high performing team.
Past Event: On-Demand Webcast
Application Security: Getting the Most Out of Your Penetration Tests
Learn how to make the most of your application pen test and implement steps for repetitive secure application design in the future.