Featured Webcast

Achieving DORA Threat-Led Penetration Testing Requirements

Gain in-depth view into DORA’s threat-led penetration testing framework with practical guidance on how to integrate offensive security services.

Headshot of Senior Security Consultant Brandon Kovacs
Webcast

Cyber Mirage: How AI is Shaping the Future of Social Engineering

In this webcast, Senior Security Consultant Brandon Kovacs aims to illuminate the sophisticated capabilities that AI brings to the table in creating hyper-realistic deepfakes and voice clones.

Headshot of speaker Rob Ragan with copy text "Testing LLM Algorithms While AI Tests Us"
Webcast

Testing LLM Algorithms While AI Tests Us

The presentation delves into securing AI & LLMs, covering threat modeling, API testing, red teaming, emphasizing robustness & reliability, sparking conversation on our interactions with GenAi.

Webcast title plus headshot of the two speakers, Chistie Terrill and Tom Eston.
Webcast

Cyber Resilience: Tactics for Post-Attack Recovery 

Join Christie Terrill and Tom Eston as they share practical advice on the proactive security measures you can take today and provide a space to ask our security experts your most pressing questions.

Headshots of Matt Twells and Anirban Banerjee for Bishop Fox Webcast
Webcast

Mitigate Third-Party Risks by Strengthening Security Foundations

Hear from Anirban Banerjee, CEO and Co-founder of Riscosity, and Matt Twells, Sr. Solution Architect at Bishop Fox, as they explore critical considerations for developing a security program that prioritizes third-party risk reduction.

Headshot of speaker Derek Rush with title text "Penetration Testing: Navigating PCI DSS Compliance"
Webcast

Penetration Testing: Navigating PCI DSS Compliance

Join our webcast with Derek Rush, Managing Senior Consultant II, as we explore achieving PCI DSS compliance using targeted penetration testing. Discover vital strategies for securing payment environments against cyber threats through tests on applications, networks, and cloud services.

Headshot of Dardan Prebreza, senior security consultant and webcast title: "How does social engineering works? From planning to execution"
Webcast

How Does Social Engineering Work? From Planning to Execution

Join our webcast as we navigate the complex terrain of social engineering, offering insights into its various stages from planning to execution, common phishing techniques, and the necessity of ongoing vigilance and proactive strategies to combat this pervasive issue.

Subscribe to Bishop Fox's Security Blog

Be first to learn about latest tools, advisories, and findings.

Headshot of main speaker: Matt Twells, Senior Solutions Architect and title of webcast: Pacemakers to Pacesetters.
Webcast

A Practical Guide to Operationalizing the FDA's 2023 Cybersecurity Requirements

Join our webcast with Matt Twells to understand the impact of the FDA's HR.2617 legislation on medical device cybersecurity, learn how to build a robust plan, address vulnerabilities, manage supply chain risks, and anticipate future trends.

Webcast title: Purple Teaming for Security Success with headshot of speaker, Ryan Basden.
Webcast

Purple Teaming for Security Success: Enhancing ROI and Facilitating Growth

In this webcast, uncover how purple teaming initiatives can transform cybersecurity from a perceived cost center to a revenue-protecting asset. Ryan Basden, Red Team security consultant, will guide you through establishing security baselines, validating investments, and formulating a roadmap for organizational growth.

Video thumbnail featuring the three panelists headshots and the title of the fireside chat on dark brackground.
Webcast

Pragmatic AI & LLM Security Mitigations for Enterprises

Immerse yourself in the vibrant world of AI and Language Learning Models (LLMs) in our webinar presented in collaboration with industry leaders from Moveworks.

Webcast title with speakers' headshot: Combatting Adversaries: Proactive Social Engineering & Network Testing.
Webcast

Combatting Adversaries: Proactive Social Engineering & Network Testing

Join us for a fireside chat that illuminates the importance of proactive social engineering defense and the key role of internal network testing in orchestrating a successful counteroffensive against cyberattacks.

Red Teaming webcast title with headshot of speaker, Trevin Edgeworth, Red Team Practice Director.
Webcast

Red Teaming: The Essential Tool for Security Leaders

Join Trevin Edgeworth, Red Team Practice Director at Bishop Fox, as he sheds light on why Red Teaming has become the ultimate "sanity check" for security team leaders.

Get the Blueprint Ponemon Institute webcast with headshots of Larry Ponemon and Tom Eston.
Webcast

Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study

Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.