The Human Element: Building Trust and Influence in Security Leadership
Veteran security leader Nate Lee reveals how effective cybersecurity depends as much on relationship-building as technical expertise. Learn practical strategies for gaining organizational trust, communicating effectively, and driving security initiatives through persuasion rather than mandate.
Beyond Whack-a-Mole: Modern AppSec Strategies for High-Growth Companies
Security leaders from Reddit, Meta, and SeatGeek share battle-tested approaches for scaling application security in fast-moving environments. Learn how these organizations are shifting from vulnerability hunting to building secure-by-default ecosystems that empower rather than hinder development teams.
Intelligence That Matters: Building Cyber Threat Programs That Drive Business Value
Veteran intelligence leaders David Etue and Nick Selby reveal what separates effective cyber threat intelligence from mere data collection. Learn how to develop intelligence capabilities that communicate meaningful risk to executives and deliver actionable insights to technical teams.
Beyond Technical Exploits: The Strategic Value of Red Team Engagements
Security researcher and YouTube educator John Hammond shares insights on effective red teaming that balances technical depth with business impact. Learn how threat intelligence, fundamentals-focused security, and emerging technologies shape today's offensive security landscape.
Managing SaaS Sprawl: Building Security Into Your Multi-Vendor Ecosystem
Marketing executive Charrah Hardamon shares insights on tackling the security challenges of modern SaaS ecosystems. Learn practical approaches to managing vendor relationships, implementing appropriate controls, and addressing AI integration without compromising data security.
The Human Side of Security Leadership: Building Teams That Thrive
Veteran security leader Dave Lewis shares his philosophy on transforming struggling teams into high-performers through trust, communication, and empathy. Learn practical approaches to leadership that enable both individual growth and organizational security.
AI's Dark Potential: Robert Hansen, RSnake and Author of AI's Best Friend, Warns of Superintelligence Risks
Security pioneer Robert "RSnake" Hansen shares insights from his book "AI's Best Friend," revealing why artificial intelligence without moral frameworks poses unprecedented dangers that regulation alone cannot address.
Testing LLM Algorithms While AI Tests Us
The presentation delves into securing AI & LLMs, covering threat modeling, API testing, red teaming, emphasizing robustness & reliability, sparking conversation on our interactions with GenAi.
Bishop Fox RSAC 2024 Livestream
Join us for our 2nd Annual Bishop Fox RSAC Livestream event - an electrifying convergence where innovation meets expertise in the realm of cybersecurity.
Cyber Resilience: Tactics for Post-Attack Recovery
Join Christie Terrill and Tom Eston as they share practical advice on the proactive security measures you can take today and provide a space to ask our security experts your most pressing questions.
Mitigate Third-Party Risks by Strengthening Security Foundations
Hear from Anirban Banerjee, CEO and Co-founder of Riscosity, and Matt Twells, Sr. Solution Architect at Bishop Fox, as they explore critical considerations for developing a security program that prioritizes third-party risk reduction.
Women in Cybersecurity: Breaking Codes, Breaking Barriers
Tune into our special livestream event where we highlight the remarkable achievements of women in the field of cybersecurity, celebrating their contributions during Women's History Month.
Pathways in Security: 21 Questions with Attack Surface Analyst Sarah Muriel
Get to know our Lady Foxes in our "21 Questions with Bishop Fox" video series. In this episode, hear from Sarah Muriel, Attack Surface Analyst
Women in Cybersecurity: 21 Questions with Security Consultant Lindsay Von Tish
Get to know our Lady Foxes in our "21 Questions with Bishop Fox" video series. In this episode, hear from Lindsay Von, Security Consultant II.
Beyond Checkbox Compliance: Maximizing Security Value from PCI DSS Penetration Testing
Security Consultant Derek Rush shares how organizations can transform mandatory PCI penetration tests from compliance exercises into meaningful security assessments by following industry guidance and adopting attacker-focused methodologies.
Exploiting Java Deserialization in GWT: From Detection to Command Execution
Watch our exclusive livestream with Ben Lincoln, Managing Principal at Bishop Fox, to learn about GWT web application vulnerabilities, exploitation strategies, and security enhancement recommendations.
How Does Social Engineering Work? From Planning to Execution
Join our webcast as we navigate the complex terrain of social engineering, offering insights into its various stages from planning to execution, common phishing techniques, and the necessity of ongoing vigilance and proactive strategies to combat this pervasive issue.
Cloud Security Podcast: Cloud Pen Test of AWS with Open Source
Hear from Bishop Fox's Seth Art in Episode 161 of Cloud Security Podcast as he shares his extensive experience with cloud penetration testing.
News Insights: 23AndMe with Alethe Denis, Security Expert - Red Team
Alethe Denis, a Bishop Fox Senior Red Team consultant and Social Engineering expert, reveals her quick-take perspective on what she sees as different about the 23AndMe breach, and how it’s viewed by someone who is a career social engineer.
A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements
Join our webcast with Matt Twells to understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future trends.
Cloud Security Podcast: Network Pentest 2.0 - The Cloud Pentest Revolution
Cloud configuration review is not a cloud security pen test! Seth Art clarifies the myth on this episode of Cloud Security Podcast.
Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth
In this webcast, uncover how purple teaming initiatives can transform cybersecurity from a perceived cost center to a revenue-protecting asset. Ryan Basden, Red Team security consultant, will guide you through establishing security baselines, validating investments, and formulating a roadmap for organizational growth.
Pentest Tools Podcast: We Think We Know How to Explain the Value of a Penetration Test
Hear from Bishop Fox's Alethe Denis in the first episode of Pentest Tool's 'We Think We Know' podcast to unravel the intricacies of security testing.
Pragmatic AI & LLM Security Mitigations for Enterprises
Immerse yourself in the vibrant world of AI and Language Learning Models (LLMs) in our webinar presented in collaboration with industry leaders from Moveworks.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.