Understand how Threat Led Penetration Testing (TLPT) establishes a foundation for DORA compliance Watch the video›

Featured Resource

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.

Red Teaming webcast title with headshot of speaker, Trevin Edgeworth, Red Team Practice Director.
Webcast

Red Teaming: The Essential Tool for Security Leaders

Join Trevin Edgeworth, Red Team Practice Director at Bishop Fox, as he sheds light on why Red Teaming has become the ultimate "sanity check" for security team leaders.

Dark purple background with headshots of speakers Erez Yalon, Vandana Verma, and Joylynn Kirui, Bishop Fox logo, and title: The Art of Hacking, Hacker's Arsenal in AppSec.
Livestream

"Hacker's Arsenal in AppSec" Session - DEF CON 31

In this session, we investigate how applications are the beating heart of the digital realm, and as hackers, we know just how to make them skip a beat.

Video thumbnail featuring the three panelist headshots: Matt Johansen, Andrew Martin, and Moses Frost.
Livestream

"Exploiting the Cloud" Session - DEF CON 31

In this session, we take a deep dive into the cloud's underbelly, exploring its vulnerabilities and exploiting its weaknesses.

Dark purple background with four panelists headshots in center, the Bishop Fox logo on top, and the title: "Tha Art Of Hacking.
Livestream

"Mastering Your Tools Session" - DEF CON 31

In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of the most elite organizations worldwide.

Video thumbnail featuring the three panelists: Barrett Darnell, Savannah Lazzara, and Wesley Thurner.
Livestream

"Red Teaming" Session - DEF CON 31

In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.

Video thumbnail; featuring the headshot of Chris Kirsch in center, the Bishop Fox logo and the title: "The Art of Hacking".
Livestream

An Interview with Chris Kirsch, CEO & Co-Founder of runZero - DEF CON 31

In this session, hear from Chris Kirsch, CEO and co-founder of runZero.

Headshot of Tom Hudson, Senior Security Engineer at Bishop Fox, Bishop Fox logo, and the tilte: "The Art of Hacking".
Livestream

An Interview with Tom Hudson, Senior Security Engineer at Bishop Fox - DEF CON 31

In this session, we talk with Tom Hudson who is a Senior Security Engineer at Bishop Fox, where he is part of the Capability Development team for Cosmos.

Dark purple background with photo of Chloe Messdaghi in the center.
Livestream

An Interview with Chloe Messdaghi, Head of Threat Research at Protect AI - DEF CON 31

In this session, hear from Chloé Messdaghi, an accomplished security executive with a proven track record of advising and developing solutions.

Dark purple background with headshot of John Hammond in the center.
Livestream

An Interview with John Hammond, Security Researcher at Huntress - DEF CON 31

In this session, hear from John Hammond who is a cybersecurity researcher, educator and content creator.

Phillip Wylie
Livestream

An Interview with Phillip Wylie, Podcast Host of Phillip Wylie Show - DEF CON 31

In this session, hear from Phillip Wylie, a cybersecurity expert with over 25 years of experience in IT and cybersecurity.

Black background with purple neon, turquoise, and white letters. Photo of speaker, Tom Hudson.
Livestream

Tool Talk: jsluice

Tune in to the eleventh episode of our Tool Talk series to hear Tom Hudson speak about jsluice, an open-source, Go package and command-line tool used to extract information from JavaScript files and code.

The Art of Hacking neon logo on dark background.
Livestream

The Art of Hacking: Livestream from DEF CON 31

Join us Friday, August 11, 2023 for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the boundaries of technology.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.