In this virtual session, Trevin Edgeworth, Red Team Practice Director at Bishop Fox, breaks down how Red Teaming gives leaders the clarity, evidence, and narrative they need to make informed, high-stakes decisions.
Red Teaming: Is Your Security Program Ready for the Ultimate Test?
In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.
Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security
Senior Security Consultant Alethe Denis takes audiences on a riveting journey into the realm of Red Teaming through captivating narratives and insightful analysis.
Achieving DORA Threat-Led Penetration Testing Requirements
Gain in-depth view into DORA’s threat-led penetration testing framework with practical guidance on how to integrate offensive security services.
Red vs Blue: Building a Well-Rounded Cybersecurity Career Path
Hear from Héctor Cuevas Cruz as he shares his career from early days in DragonJAR forum to how he's become a team leader of hackers for Bishop Fox.
Cyber Mirage: How AI is Shaping the Future of Social Engineering
In this webcast, Senior Security Consultant Brandon Kovacs aims to illuminate the sophisticated capabilities that AI brings to the table in creating hyper-realistic deepfakes and voice clones.
Bishop Fox Livestream at DEF CON 32
Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.
Navigating the IAM Maze: Expert Strategies for Cloud Identity Security
In this expert-led session, security leaders discuss the critical challenges and solutions for managing identities in complex cloud environments. Learn how to tackle machine identities, implement continuous hygiene practices, and leverage AI for enhanced security posture.
Speaking Board Language: Translating Cybersecurity for Executive Leadership
McKinsey cybersecurity leaders share essential strategies for translating complex security challenges into business-focused board discussions. Learn how to effectively communicate risk, establish meaningful metrics, and build productive partnerships with your organization's leadership.
The Human Element: Building Trust and Influence in Security Leadership
Veteran security leader Nate Lee reveals how effective cybersecurity depends as much on relationship-building as technical expertise. Learn practical strategies for gaining organizational trust, communicating effectively, and driving security initiatives through persuasion rather than mandate.
Beyond Whack-a-Mole: Modern AppSec Strategies for High-Growth Companies
Intelligence That Matters: Building Cyber Threat Programs That Drive Business Value
Beyond Technical Exploits: The Strategic Value of Red Team Engagements
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.