Two recent cyberattacks crippled global enterprises by exploiting Salesforce OAuth mechanisms. Join CISO Christie Terrill and former Salesforce security leader Brian Soby for an exclusive breakdown of these breaches and actionable defense strategies in this live fireside chat.
A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements
Join our webcast with Matt Twells to understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future trends.
Cloud Security Podcast: Network Pentest 2.0 - The Cloud Pentest Revolution
Cloud configuration review is not a cloud security pen test! Seth Art clarifies the myth on this episode of Cloud Security Podcast.
Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth
In this webcast, uncover how purple teaming initiatives can transform cybersecurity from a perceived cost center to a revenue-protecting asset. Ryan Basden, Red Team security consultant, will guide you through establishing security baselines, validating investments, and formulating a roadmap for organizational growth.
Pentest Tools Podcast: We Think We Know How to Explain the Value of a Penetration Test
Hear from Bishop Fox's Alethe Denis in the first episode of Pentest Tool's 'We Think We Know' podcast to unravel the intricacies of security testing.
Pragmatic AI & LLM Security Mitigations for Enterprises
Immerse yourself in the vibrant world of AI and Language Learning Models (LLMs) in our webinar presented in collaboration with industry leaders from Moveworks.
OWASP ASVS: Unlocking Stronger Application Security
Join offensive security expert Shanni Prutchi in this livestream as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard (ASVS). Learn how to generate test cases and gain insights to effectively test your applications against the standard.
Strengthening Incident Response: Combining Tabletop Exercises with Red Team Engagements
Learn how integrating tabletop exercises with red team assessments creates a more comprehensive evaluation of your organization's incident response capabilities. Security expert Shanni Prutchi shares practical approaches for testing both your technical controls and response processes against realistic attack scenarios.
Red Teaming: The Essential Tool for Security Leaders
Join Trevin Edgeworth, Red Team Practice Director at Bishop Fox, as he sheds light on why Red Teaming has become the ultimate "sanity check" for security team leaders.
AppSec Arsenal: Modern Exploitation Techniques & Advanced Defense Strategies
In this session, we investigate how applications are the beating heart of the digital realm, and as hackers, we know just how to make them skip a beat.
Cloud Attack Vectors: Expert Techniques for Finding Critical Vulnerabilities
In this session, we take a deep dive into the cloud's underbelly, exploring its vulnerabilities and exploiting its weaknesses.
Offensive Security Arsenal: Building and Mastering Custom Security Tools
In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of the most elite organizations worldwide.
Red Team Reality: Advanced Strategies for Modern Attack Simulation
In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.