Featured Webcast

Achieving DORA Threat-Led Penetration Testing Requirements

Gain in-depth view into DORA’s threat-led penetration testing framework with practical guidance on how to integrate offensive security services.

Panelist headshots for fireside chat  How the National Cybersecurity Strategy Will Shape the Future of Offensive Security.
Webcast

How the New National Cybersecurity Strategy Will Shape the Future of Offensive Security

Join Bishop Fox for a fireside chat with renowned cybersecurity experts – Evan Wolff & Justin Greis. We’ll discuss how new proposed regulations will impact offensive security initiatives, both short- and long-term.

Webcast title: Notes from the dark side next to two light cybers on dark purple background.
Webcast

Notes from the Dark Side: What Our Data Reveals About the Attack Surface

Join our offensive security experts as they share insights gleaned from analyzing twelve months of findings captured in Cosmos, our award-winning attack surface management platform.

GigaOm Special Webcast on Attack Surface Management solution featuring analyst Chris Ray with headshot
Webcast

2023 GigaOm Radar Webcast: Attack Surface Management

Join us to learn how to choose the right ASM solution for your needs and how new ASM solutions can help you improve your overall security posture.

Bishop Fox with female fox astronaut in Rosie Riveter pose with webcast title: Defend Like A Girl and sub title: Making your way to cyber success.
Webcast

Defend Like A Girl: Hacking Your Way to Cyber Success

Join our livestream as host Alethe Denis and special guests Lindsay Von Tish, Jessica Stinson, Shanni Prutchi, and Katie Ritchie as they share their experiences as hackers and showcase how you can find success in the rapidly evolving world of cybersecurity.

Penetrating the Cloud title on dark purple background and security consultants, Seth Art & Nate Robb headshots.
Webcast

Penetrating the Cloud: Uncovering Unknown Vulnerabilities

Seth Art, Principal Security Consultant at Bishop Fox, and Nate Robb, Senior Operator at Bishop Fox, discuss two distinct ways (zero-knowledge & assumed-breach perspectives) to proactively identify, understand, and mitigate the most impactful vulnerabilities lurking in your cloud environment.

Webcast on how to prepare for ransomware with real-world playbooks featuring the headshots of Bishop Fox security experts, Tom Eston and Trevin Edgeworth.
Webcast

Ready or Not? Test Your Ransomware Defenses Against Real-World Playbooks

Join Bishop Fox experts Tom Eston, AVP of Consulting and Trevin Edgeworth, Red Team Practice Director as they breakdown why ransomware emulations are the best way to test your defenses.

Bishop Fox WTV EDR Bypass OG
Webcast

What the Vuln: EDR Bypass with LoLBins

Watch the second episode of our What the Vuln livestream series as we explore how to bypass endpoint detection and response (EDR) with native Windows binaries to gain advanced post-exploitation control.

Bishop Fox Livestream Zimbra Tile
Webcast

What the Vuln: Zimbra

Watch the inaugural episode of our What the Vuln livestream series as we examine Zimbra Zip Path Traversal vulnerabilities, CVE-2022-27925 and CVE-2022-37042.

Tool Talk Episode 9 webcast title in neon letters on dark background with Matt Keeley and Joe Sechman headshots presenting the security tool Spoofy.
Webcast

Tool Talk: Spoofy

Watch to explore Spoofy, a domain spoofing tool that checks whether a list of domains (in bulk) can be spoofed based on SPF and DMARC records.

Webcast on how emulation techniques provide safe testing scenarios to uncover ransomware susceptibility featuring the headshots of Bishop Fox and Illumio security experts, Trevin Edgeworth and Paul Dant.
Webcast

Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams

Join us to learn how ransomware emulation provides safe testing scenarios to uncover ransomware susceptibility in your security environment.

SANS and Bishop Fox webcast: Hacker Insights Revealed - Explore new ssurvey results with the cybersecurity experts.
Webcast

Hacker Insights Revealed: Explore New SANS Survey Results

In partnership with SANS,we share what our latest report uncovers about the minds and methodologies of modern attackers and how this can help to improve your security posture.

Bishop Fox Tool Talk Episode 8 asminject.py
Webcast

Tool Talk: asminject.py

Watch as we explore Bishop Fox’s very own asminject.py, a code injection tool that tampers with trusted Linux processes to capture sensitive data and change program behavior.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.