AI doesn’t crash when compromised—it complies. Join Jessica Stinson as she shares real-world AI security failures, revealing how trusted tools are silently hijacked. Learn to spot hidden risks and build resilient AI defenses before silence turns into breach.
Strategic Insights from Wendy Nather Cisco's Advisory CISO Leader
Hear from Wendy Nather, Head of Advisory CISOs at Cisco. She is co-author of The Cloud Security Rules, and she was listed as one of SC Magazine‘s women in IT security “power players” in 2014, as well as an “influencer” in the Reboot Leadership Awards in 2018; she was also inducted into the Infosecurity Europe Hall of Fame in 2021.
Disrupting Cybersecurity: A CISO-Investor's Blueprint for Industry Innovation
Westcap's Christian Schnedler shares his journey from protecting NYC during Occupy Wall Street to identifying the next generation of cybersecurity innovators, revealing why identity management represents the industry's most critical frontier.
Breaking Barriers in Cybersecurity: Leadership Insights from BlackGirlsHack's Founder
In this session, hear from Tennisha Martin who is the founder and Executive Director of BlackGirlsHack (BGH Foundation), a national cybersecurity nonprofit organization dedicated to providing education and resources to underserved communities and increasing the diversity in cyber.
From Product Security to Incident Response: Strategic Insights from NYDIG's CISO
Former Microsoft security executive Avi Ben-Menachem shares insights on building security teams founded on military values, bridging technical and business perspectives, and adapting security approaches across vastly different technology environments.
Leadership Beyond Authority: Building Inclusive Security Culture with Andy Ellis
In this session, hear from Andy Ellis who is a seasoned technology and business executive with deep expertise in security, managing risk, and leading an inclusive culture. He is also the author of 1% Leadership, a handy guidebook that business readers can regularly apply to identify blind spots, boost morale, and solve problems at work.
Defend Like A Girl: Hacking Your Way to Cyber Success
Join our livestream as host Alethe Denis and special guests Lindsay Von Tish, Jessica Stinson, Shanni Prutchi, and Katie Ritchie as they share their experiences as hackers and showcase how you can find success in the rapidly evolving world of cybersecurity.
Combatting Adversaries: Proactive Social Engineering & Network Testing
Explore how sophisticated social engineering techniques bypass traditional security controls, featuring insights from Bishop Fox security experts on realistic attack scenarios and practical defensive strategies.
RSA Conference 2023: Leadership Perspectives in Cybersecurity - From CISOs to Founders
Watch from RSA Conference to explore cybersecurity leadership through multiple lenses. Get perspectives from CISOs, industry authorities, cyber-focused investors, and security founders on topics that are top of mind for today’s security leaders.
Penetrating the Cloud: Uncovering Unknown Vulnerabilities
This presentation from Bishop Fox security experts reveals how attackers exploit common cloud misconfigurations to gain unauthorized access to sensitive data, demonstrating why continuous testing is essential for cloud security.
Ready or Not? Test Your Ransomware Defenses Against Real-World Playbooks
Join Bishop Fox experts Tom Eston, AVP of Consulting and Trevin Edgeworth, Red Team Practice Director as they breakdown why ransomware emulations are the best way to test your defenses.
Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams
Join us to learn how ransomware emulation provides safe testing scenarios to uncover ransomware susceptibility in your security environment.
Hacker Insights Revealed: Explore New SANS Survey Results
In partnership with SANS,we share what our latest report uncovers about the minds and methodologies of modern attackers and how this can help to improve your security posture.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.