AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Jayson Street

Bishop Fox Live at DEF CON 30 featuring Jayson Street

Listen to Jayson E. Street, Hacker & Author of "Dissecting the Hack: The F0rb1dd3n Network," discuss his hacking adventures with Bishop Fox hosts Tom Eston and Joe Sechman during our inaugural 2022 DEF CON livestream!

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Ray Espinoza

Bishop Fox Live at DEF CON 30 featuring Ray Espinoza

Tune in as Ray Espinoza, CISO at Inspectiv, discusses coaching in security, making infosec more diverse, doing vulnerability management, and more!

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Raghu Nandakumara

Bishop Fox Live at DEF CON 30 featuring Raghu Nandakumara

Hear Raghu Nandakumara, Senior Director and Head of Solutions at Illumio, discuss ransomware and zero-trust segmentation.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Kevin Johnson

Bishop Fox Live at DEF CON 30 featuring Kevin Johnson

Check out Kevin Johnson, co-host of The Shared Security Show Podcast, discuss topics like open-source, the OWASP SamuraiWTF, and application security!

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Vinnie Liu

Bishop Fox Live at DEF CON 30 featuring Vinnie Liu

Listen to this exclusive interview with Bishop Fox CEO Vinnie Liu where he shares his opinion on various cybersecurity trends and hot topics.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Alethe Denis

Bishop Fox Live at DEF CON 30 featuring Alethe Denis

Listen to social engineering expert Alethe Denis share her stories and insight with our DEF CON livestream hosts Tom Eston and Joe Sechman.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Juneau

Bishop Fox Live at DEF CON 30 featuring Juneau

As part of our inaugural DEF CON livestream in 2022, our hosts Tom Eston and Joe Sechman spoke to infosec community member Juneau about her professional journey and the topics she's most passionate about.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Tanya Janca

Bishop Fox Live at DEF CON 30 featuring Tanya Janca

In this session from our DEF CON livestream, Tanya Janca (AKA SheHacksPurple) talks about her books, her security journey, SAST/DAST, and more!

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Barrett Darnell

Bishop Fox Live at DEF CON 30 featuring Barrett Darnell

In this session from the Bishop Fox DEF CON 30 livestream, Principal Security Engineer at Intuit & former Fox Barrett Darnell stops by to chat with hosts Tom Eston and Joe Sechman.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Yael Basurto Esquivel

Bishop Fox Live at DEF CON 30 featuring Yael Basurto Esquivel

Listen to Bishop Fox Security Consultant Yael Basurto Esquivel discuss some of his latest infosec research during this DEF CON 30 interview!

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Steve Ragan

Bishop Fox Live at DEF CON 30 featuring Steve Ragan

Check out this DEF CON 30 livestream snippet with security storyteller and editor at Cisco Steve Ragan!

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring DFIR Matt Scheuer

Bishop Fox Live at DEF CON 30 featuring DFIR Matt Scheuer

Tune in to this snippet from the Bishop Fox DEF CON livestream 30 where Tom Eston and Joe Sechman interview DFIR Matt Scheuer, host of the ThreatReel podcast.

Watch Session
Guides

Breaking & Entering: A Pocket Guide for Friendly Remote Admins

Breaking & Entering: A Pocket Guide for Friendly Remote Admins

This user-friendly guide offers a comprehensive offensive security roadmap for sysadmins, penetration testers, and other security professionals.

Read Guide
Resource

What the Vuln: EDR Bypass with LoLBins

What the Vuln: EDR Bypass with LoLBins

Watch the second episode of our What the Vuln livestream series as we explore how to bypass endpoint detection and response (EDR) with native Windows binaries to gain advanced post-exploitation control.

Learn More
Virtual Sessions

21 Questions with Kaitlin O'Neil, Recruiting Manager

21 Questions with Kaitlin O'Neil, Recruiting Manager

When you think of cybersecurity… what do you picture? A guy in a hoodie behind a keyboard? We don’t blame you. But Kaitlin is here to show you that women in cybersecurity are on the rise and ready to even the playing field.

Watch Session
Virtual Sessions

Bishop Fox Live at DEF CON 30 featuring Sandeep Singh

Bishop Fox Live at DEF CON 30 featuring Sandeep Singh

In this DEF CON 30 interview from the Bishop Fox livestream, ProjectDiscovery co-founder and Nuclei creator Sandeep Singh (Geekboy) shares some thoughts about the open source community, his company, and more.

Watch Session
Virtual Sessions

21 Questions with Bianca Luna-Acosta, Security Consultant II

21 Questions with Bianca Luna-Acosta, Security Consultant II

Get to know our Lady Foxes in our "21 Questions with Bishop Fox" video series. In this episode, hear from Bianca Luna-Acosta, Security Consultant II.

Watch Session
Virtual Sessions

21 Questions with Chelsea Bradley, Contracts Manager

21 Questions with Chelsea Bradley, Contracts Manager

Get to know our Lady Foxes in our "21 Questions with Bishop Fox" video series. In this episode, hear from Chelsea Bradley, Contracts Manager.

Watch Session
Workshops & Training

Unredacter Challenge: John L.'s Solution

Unredacter Challenge: John L.'s Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as John L. showcases his solution.

Watch Workshop
Workshops & Training

Unredacter Challenge: Shawn A.'s Solution

Unredacter Challenge: Shawn A.'s Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as Shawn A. showcases his solution.

Watch Workshop
Workshops & Training

Unredacter Challenge: Alejandro's Solution

Unredacter Challenge: Alejandro's Solution

Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as Alejandro showcases his solution.

Watch Workshop
Virtual Sessions

TomNomNom AMA

TomNomNom AMA

Tom Hudson (aka TomNomNom) participates in this Discord AMA about the pen testing tools he's created over the years, his cybersecurity journey, and more.

Watch Session
Workshops & Training

Managing Application Security Risk with Threat Modeling

Managing Application Security Risk with Threat Modeling
Watch Workshop
Virtual Sessions

Fireside Chat: What We Learned from the SolarWinds Attack (and Beyond)

Fireside Chat: What We Learned from the SolarWinds Attack (and Beyond)

On-demand webcast features security experts discussing recent attacks at SolarWinds, Colonial Pipeline, and more.

Watch Session

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.