Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Featured Virtual Session

Breaking AI: Inside the Art of LLM Pen Testing

Learn why traditional penetration testing fails on LLMs. Join Bishop Fox’s Brian D. for a deep dive into adversarial prompt exploitation, social engineering, and real-world AI security techniques. Rethink how you test and secure today’s most powerful models.

Video thumbnail featuring Ray Espinosa CISO at Inspectiv with headshot.
Virtual Session

Bishop Fox Live at DEF CON 30 featuring Ray Espinoza

Tune in as Ray Espinoza, CISO at Inspectiv, discusses coaching in security, making infosec more diverse, doing vulnerability management, and more!

Raghu Nandakurama headshot on video thumbnail with overlay play button.
Virtual Session

Bishop Fox Live at DEF CON 30 featuring Raghu Nandakumara

Hear Raghu Nandakumara, Senior Director and Head of Solutions at Illumio, discuss ransomware and zero-trust segmentation.

Video Thumbnail with overlay play button featuring Kevin Johnson headshot.
Virtual Session

Bishop Fox Live at DEF CON 30 featuring Kevin Johnson

Check out Kevin Johnson, co-host of The Shared Security Show Podcast, discuss topics like open-source, the OWASP SamuraiWTF, and application security!

Video thumbnail with play button featuring Bishop Fox Co-Founder and CEO, Vinnie Liu'd headshot.
Virtual Session

Bishop Fox Live at DEF CON 30 featuring Vinnie Liu

Listen to this exclusive interview with Bishop Fox CEO Vinnie Liu where he shares his opinion on various cybersecurity trends and hot topics.

Video thumbnail with overlay play button featuring headshot of cybersecurity expert, Alethe Denis.
Virtual Session

Bishop Fox Live at DEF CON 30 featuring Alethe Denis

Listen to social engineering expert Alethe Denis share her stories and insight with our DEF CON livestream hosts Tom Eston and Joe Sechman.

Headshot of Juneau security researcher and twitter handle @juneau with a play button superimposed
Virtual Session

Bishop Fox Live at DEF CON 30 featuring Juneau

As part of our inaugural DEF CON livestream in 2022, our hosts Tom Eston and Joe Sechman spoke to infosec community member Juneau about her professional journey and the topics she's most passionate about.

Video thumbnail with overlay play button featuring cybersecurity expert, Tanya Janca (AKA SheHacksPurple) headshot.
Virtual Session

Bishop Fox Live at DEF CON 30 featuring Tanya Janca

In this session from our DEF CON livestream, Tanya Janca (AKA SheHacksPurple) talks about her books, her security journey, SAST/DAST, and more!

Barrett Darnell headshot on video thumbnail with play button.
Virtual Session

Bishop Fox Live at DEF CON 30 featuring Barrett Darnell

In this session from the Bishop Fox DEF CON 30 livestream, Principal Security Engineer at Intuit & former Fox Barrett Darnell stops by to chat with hosts Tom Eston and Joe Sechman.

Yael Basurto Esquivel headshot on video thumbnail with play button.
Virtual Session

Bishop Fox Live at DEF CON 30 featuring Yael Basurto Esquivel

Listen to Bishop Fox Security Consultant Yael Basurto Esquivel discuss some of his latest infosec research during this DEF CON 30 interview!

Headshot of cybersecurity expert Steve Ragan on video thumbnail with play button.
Virtual Session

Bishop Fox Live at DEF CON 30 featuring Steve Ragan

Check out this DEF CON 30 livestream snippet with security storyteller and editor at Cisco Steve Ragan!

DFIR Matt Scheuer headshot on video thumbnail with play button.
Virtual Session

Bishop Fox Live at DEF CON 30 featuring DFIR Matt Scheuer

Tune in to this snippet from the Bishop Fox DEF CON livestream 30 where Tom Eston and Joe Sechman interview DFIR Matt Scheuer, host of the ThreatReel podcast.

Video of 21 Questions series with Kaitlin O'Neil headshot on dark background.
Virtual Session

21 Questions with Kaitlin O'Neil, Recruiting Manager

When you think of cybersecurity… what do you picture? A guy in a hoodie behind a keyboard? We don’t blame you. But Kaitlin is here to show you that women in cybersecurity are on the rise and ready to even the playing field.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.