In this virtual session, Trevin Edgeworth, Red Team Practice Director at Bishop Fox, breaks down how Red Teaming gives leaders the clarity, evidence, and narrative they need to make informed, high-stakes decisions.
Cloud Attack Vectors: Expert Techniques for Finding Critical Vulnerabilities
In this session, we take a deep dive into the cloud's underbelly, exploring its vulnerabilities and exploiting its weaknesses.
Offensive Security Arsenal: Building and Mastering Custom Security Tools
In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of the most elite organizations worldwide.
Red Team Reality: Advanced Strategies for Modern Attack Simulation
In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.
The Art of Human Hacking: Social Engineering Success Stories
In this session, hear from Chris Kirsch, CEO and co-founder of runZero.
Building Better Security Tools: Inside the Mind of an Open-Source Innovator
In this session, we talk with Tom Hudson who is a Senior Security Engineer at Bishop Fox, where he is part of the Capability Development team for Cosmos.
The Human Side of Security: Creating Impact Through Leadership & Advocacy
In this session, hear from Chloé Messdaghi, an accomplished security executive with a proven track record of advising and developing solutions.
Malware Analysis Mastery: A Conversation with John Hammond
In this session, hear from John Hammond who is a cybersecurity researcher, educator and content creator.
The Pentester's Journey: Expert Insights from a Security Veteran
In this session, hear from Phillip Wylie, a cybersecurity expert with over 25 years of experience in IT and cybersecurity.
JavaScript Vulnerability Mining: Mastering jsluice for Advanced Web App Testing
Tune in to the eleventh episode of our Tool Talk series to hear Tom Hudson speak about jsluice, an open-source, Go package and command-line tool used to extract information from JavaScript files and code.
Hacker Evolution: From Technical Mastery to Visionary Leadership
Join us Friday, August 11, 2023 for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the boundaries of technology.
Breaking Down Q2's Critical CVEs: From Discovery to Exploitation
Watch the third episode of our What the Vuln technical series as we share the most intriguing vulnerabilities that we encountered in Q2 2023 and how we hacked them.
Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study
Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.