Two recent cyberattacks crippled global enterprises by exploiting Salesforce OAuth mechanisms. Join CISO Christie Terrill and former Salesforce security leader Brian Soby for an exclusive breakdown of these breaches and actionable defense strategies in this live fireside chat.
CloudFox: Cloud Enumeration for Penetration Testing
In this session, Mitchell Sperling, Senior Security Consultant at Bishop Fox, will demonstrate how he uses CloudFox during cloud penetration tests to quickly enumerate large cloud environments and identify interesting attack paths.
AI War Stories: Silent Failures, Real Consequences
AI doesn’t crash when compromised—it complies. Join Jessica Stinson as she shares real-world AI security failures, revealing how trusted tools are silently hijacked. Learn to spot hidden risks and build resilient AI defenses before silence turns into breach.
Breaking AI: Inside the Art of LLM Pen Testing
Learn why traditional penetration testing fails on LLMs. Join Bishop Fox’s Brian D. for a deep dive into adversarial prompt exploitation, social engineering, and real-world AI security techniques. Rethink how you test and secure today’s most powerful models.
Architecting Cloud Security Testing in the GenAI Era
Join Steven Smiley and Jessica Stinson for a deep dive into how early-stage architectural reviews can transform the effectiveness of your testing. Whether you're navigating IAM setups or preparing to tackle GenAI risks in cloud environments, this session has the clarity and direction you need to test smarter—not just harder.
Attacking & Defending Deepfakes: A Red Teamer’s Perspective
Explore the offensive and defensive use of deepfake technology in cybersecurity with Bishop Fox red teamer Brandon Kovacs. This session dives into real-world attack simulations, red team methodologies, and practical mitigation strategies for organizations facing the rapidly growing threat of deepfakes.
Attack Surface Management: Measuring Real-World Impact
Our experts explain how to tell if your ASM is effective, what teams often miss, and why it’s more than just tracking known vulnerabilities.
Subscribe to our blog and advisories
Be first to learn about latest tools, advisories, and findings.
Thank You! You have been subscribed.
The Promise and Perils of AI: Navigating Emerging Cyber Threats - A Dark Reading Panel
This video showcases leading voices in cybersecurity explaining their examinations into how AI is simultaneously transforming cyber defense and supercharging attacker capabilities. Together, they explored how GenAI is reshaping the threat landscape and what security leaders must do to adapt.
Building Cybersecurity Companies: Stories and Lessons from Two Women Founders
Christie Terrell, CISO at Bishop Fox, interviews Deidre Diamond, Founder & CEO of CyberSN and Founder of Secure Diversity, and Juliet Okafor, Founder & CEO of RevolutionCyber about their experiences founding their own companies in the cybersecurity industry.
Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security
Watch Alethe Denis, Senior Security Consultant, for an engaging deep dive into the world of Red Teaming. Through real-life stories and expert analysis, this webcast will explore the triumphs, missteps, and critical takeaways from Red Team engagements.
Red Teaming: Is Your Security Program Ready for the Ultimate Test?
In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.
Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security
Senior Security Consultant Alethe Denis takes audiences on a riveting journey into the realm of Red Teaming through captivating narratives and insightful analysis.
Achieving DORA Threat-Led Penetration Testing Requirements
Gain in-depth view into DORA’s threat-led penetration testing framework with practical guidance on how to integrate offensive security services.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.