In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.
Bishop Fox Application Penetration Testing Packages Methodology
This methodology document provides an overview of how Bishop Fox conducts our standardized application penetration testing services.
Bishop Fox Livestream at DEF CON 32
Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.
Smart Grills Get Smarter: Improving IoT Security One Device at a Time
Bishop Fox Security Consultant, Nisk Cerne discovered and worked with Traeger Grills to disclose a vulnerability in the company’s embedded Wi-Fi Controller that allows users to connect to and control their grills remotely.
Come WiFind Me: WiFi & Other RF Surveillance
Join Alissa Gilbert (dnsprincess) as she dispels myths around RF tracking, negates some fears, and gives completely new ones in its place.
Navigating the IAM Maze: Expert Strategies for Cloud Identity Security
In this expert-led session, security leaders discuss the critical challenges and solutions for managing identities in complex cloud environments. Learn how to tackle machine identities, implement continuous hygiene practices, and leverage AI for enhanced security posture.
Speaking Board Language: Translating Cybersecurity for Executive Leadership
McKinsey cybersecurity leaders share essential strategies for translating complex security challenges into business-focused board discussions. Learn how to effectively communicate risk, establish meaningful metrics, and build productive partnerships with your organization's leadership.
Intelligence That Matters: Building Cyber Threat Programs That Drive Business Value
Beyond Whack-a-Mole: Modern AppSec Strategies for High-Growth Companies
The Human Element: Building Trust and Influence in Security Leadership
Veteran security leader Nate Lee reveals how effective cybersecurity depends as much on relationship-building as technical expertise. Learn practical strategies for gaining organizational trust, communicating effectively, and driving security initiatives through persuasion rather than mandate.
Beyond Technical Exploits: The Strategic Value of Red Team Engagements
Managing SaaS Sprawl: Building Security Into Your Multi-Vendor Ecosystem
Marketing executive Charrah Hardamon shares insights on tackling the security challenges of modern SaaS ecosystems. Learn practical approaches to managing vendor relationships, implementing appropriate controls, and addressing AI integration without compromising data security.
The Human Side of Security Leadership: Building Teams That Thrive
Veteran security leader Dave Lewis shares his philosophy on transforming struggling teams into high-performers through trust, communication, and empathy. Learn practical approaches to leadership that enable both individual growth and organizational security.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.