Tactics of Deception: Protecting Trust and Purpose
The Role of AI in Modernizing Enterprise Application Security
AI & Security Risks: A Cyber Leadership Panel
Application Security: Getting More Out of Your Pen Tests
Red Teaming: The Essential Tool for Security Leaders
Peeling Back the Plastic: Finding 0-Days in IoT Devices
The Basics are the Breach: Lessons from Real-World Product Security Reviews
Fireside Chat - SaaS Security: Inside Recent Attacks Disrupting Global Enterprises
CloudFox: Cloud Enumeration for Penetration Testing
AI War Stories: Silent Failures, Real Consequences
Breaking AI: Inside the Art of LLM Pen Testing
Architecting Cloud Security Testing in the GenAI Era
Attacking & Defending Deepfakes: A Red Teamer’s Perspective
Attack Surface Management: Measuring Real-World Impact
The Promise and Perils of AI: Navigating Emerging Cyber Threats - A Dark Reading Panel
Building Cybersecurity Companies: Stories and Lessons from Two Women Founders
Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security
Red Teaming: Is Your Security Program Ready for the Ultimate Test?
Achieving DORA Threat-Led Penetration Testing Requirements
Red vs Blue: Building a Well-Rounded Cybersecurity Career Path
Cyber Mirage: How AI is Shaping the Future of Social Engineering
Bishop Fox Livestream at DEF CON 32
Navigating the IAM Maze: Expert Strategies for Cloud Identity Security
Speaking Board Language: Translating Cybersecurity for Executive Leadership
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.