AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Virtual Sessions

Virtual Sessions

Defend Like A Girl: Hacking Your Way to Cyber Success

Defend Like A Girl: Hacking Your Way to Cyber Success

Join our livestream as host Alethe Denis and special guests Lindsay Von Tish, Jessica Stinson, Shanni Prutchi, and Katie Ritchie as they share their experiences as hackers and showcase how you can find success in the rapidly evolving world of cybersecurity.

Watch Session
Virtual Sessions

Combatting Adversaries: Proactive Social Engineering & Network Testing

Combatting Adversaries: Proactive Social Engineering & Network Testing

Explore how sophisticated social engineering techniques bypass traditional security controls, featuring insights from Bishop Fox security experts on realistic attack scenarios and practical defensive strategies.

Watch Session
Virtual Sessions

RSA Conference 2023: Leadership Perspectives in Cybersecurity - From CISOs to Founders

RSA Conference 2023: Leadership Perspectives in Cybersecurity - From CISOs to Founders

Watch from RSA Conference to explore cybersecurity leadership through multiple lenses. Get perspectives from CISOs, industry authorities, cyber-focused investors, and security founders on topics that are top of mind for today’s security leaders.

Watch Session
Virtual Sessions

Penetrating the Cloud: Uncovering Unknown Vulnerabilities

Penetrating the Cloud: Uncovering Unknown Vulnerabilities

This presentation from Bishop Fox security experts reveals how attackers exploit common cloud misconfigurations to gain unauthorized access to sensitive data, demonstrating why continuous testing is essential for cloud security.

Watch Session
Virtual Sessions

Ready or Not? Test Your Ransomware Defenses Against Real-World Playbooks

Ready or Not? Test Your Ransomware Defenses Against Real-World Playbooks

Join Bishop Fox experts Tom Eston, AVP of Consulting and Trevin Edgeworth, Red Team Practice Director as they breakdown why ransomware emulations are the best way to test your defenses.

Watch Session
Virtual Sessions

Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams

Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams

Join us to learn how ransomware emulation provides safe testing scenarios to uncover ransomware susceptibility in your security environment.

Watch Session
Virtual Sessions

Hacker Insights Revealed: Explore New SANS Survey Results

Hacker Insights Revealed: Explore New SANS Survey Results

In partnership with SANS,we share what our latest report uncovers about the minds and methodologies of modern attackers and how this can help to improve your security posture.

Watch Session
Virtual Sessions

Bridging the Gap Between Military and Civilian Work

Bridging the Gap Between Military and Civilian Work

Tune into our livestream session to hear Skillbridge cybersecurity success stories.

Watch Session
Virtual Sessions

Tool Talk: Unredacter

Tool Talk: Unredacter

In our fourth edition of the Tool Talk series, we dive into Unredacter, a tool created by Dan Petro, Lead Researcher at Bishop Fox, that takes redacted pixelized text and reverses it back to its original text.

Watch Session
Virtual Sessions

Vinnie Liu: A Life in the Offensive Security Trenches

Vinnie Liu: A Life in the Offensive Security Trenches

Ryan Naraine, Editor at SecurityConversations, interviews Bishop Fox's Co-Founder & CEO Vinnie Liu on the origins and evolution of the pen testing services business.

Watch Session
Virtual Sessions

Watch a Special Livestream From DEF CON 30

Watch a Special Livestream From DEF CON 30

Watch the lineup of leaders & influencers from the infosec community who joined us live at DEF CON 30!

Watch Session
Virtual Sessions

Leveraging Nuclei for Scalable, Custom Vulnerability Scanning

Leveraging Nuclei for Scalable, Custom Vulnerability Scanning

In our third edition of the Tool Talk series, we dive into the open-source tool Nuclei, a fast and customizable vulnerability scanner based on simple YAML-based DSL.

Watch Session
Virtual Sessions

2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management

2022 GigaOm Analyst Webcast: Everything You Need to Know About Attack Surface Management

Tune into our webcast to learn more about Attack Surface Management and tips for evaluating solutions. GigaOm analyst Chris Ray joins us to share his insights!

Watch Session
Virtual Sessions

Tool Talks: Debugging Ruby Exploits

Tool Talks: Debugging Ruby Exploits

In our sixth edition of the Tool Talk series, we explore a new test harness for discovering and crafting Ruby exploits.

Watch Session
Virtual Sessions

Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business

Achieving Warp Speed to Continuous Testing: How to Calculate ROI for your Business

Uncover your organization’s unique cost savings and risk mitigation strategy for a continuous offensive testing solution with our customized ROI calculation.

Watch Session
Virtual Sessions

Combating Ransomware with an Offensive Roadmap

Combating Ransomware with an Offensive Roadmap

Examine your organization’s level of ransomware preparedness through the lens of offensive security considerations.

Watch Session
Virtual Sessions

SC Media Special Event: Continuously Hacking Yourself

SC Media Special Event: Continuously Hacking Yourself

Explore the benefits of continually hacking yourself to discover new assets (including many you don’t even know you have) and their associated vulnerabilities.

Watch Session
Virtual Sessions

Cracking the Code: Secure Code Review in DevSecOps

Cracking the Code: Secure Code Review in DevSecOps

On-demand webcast offers an in-depth look at how DevOps can integrate both automated and manual code review into the software development lifecycle.

Watch Session
Virtual Sessions

The Wolf in Sheep's Clothing: How Innocuous Exposures Become Infamous

The Wolf in Sheep's Clothing: How Innocuous Exposures Become Infamous

In the hands of skilled attackers, many "low risk" exposures serve as launching pads or steppingstones to more complex and destructive attacks. Join our webcast as we dive into real-world examples.

Watch Session
Virtual Sessions

What Bad Could Happen? Managing Application Risk with Threat Modeling

What Bad Could Happen? Managing Application Risk with Threat Modeling

What if security could become an integral framework within the software development process? Join Tom Eston and Chris Bush to learn how Threat Modeling is changing the way organizations manage application security risks.

Watch Session
Virtual Sessions

A Deep Dive Into Fuzzing

A Deep Dive Into Fuzzing

Get the buzz on fuzz testing in software development.

Watch Session
Virtual Sessions

Outpacing the Speed and Precision of Modern Attackers with Continuous Attack Surface Testing

Outpacing the Speed and Precision of Modern Attackers with Continuous Attack Surface Testing

On-demand webcast provides an in-depth look at using Continuous Attack Surface Testing (CAST) to identify and close attack windows before it’s too late.

Watch Session
Virtual Sessions

How to Build a DevSecOps Program that Works for Developers AND Security

How to Build a DevSecOps Program that Works for Developers AND Security

On-demand webcast explores how the right DevSecOps strategy empowers both your security and development teams.

Watch Session
Virtual Sessions

DevSecOps and Application Penetration Testing: Defying the Myth

DevSecOps and Application Penetration Testing: Defying the Myth

On-demand webcast dives into the role of application penetration testing in today’s software development lifecycle (SDLC).

Watch Session

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.