AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Virtual Sessions

Red Teaming: The Essential Tool for Security Leaders

Red Teaming: The Essential Tool for Security Leaders

Watch Trevin Edgeworth, Red Team Practice Director at Bishop Fox, in this virtual session where he will break down how Red Teaming gives leaders the clarity, evidence, and narrative they need to make informed, high-stakes decisions in the current AI landscape.

Watch Session
Virtual Sessions

Peeling Back the Plastic: Finding 0-Days in IoT Devices

Peeling Back the Plastic: Finding 0-Days in IoT Devices

Join Senior Security Consultant Nick Cerne for “Peeling Back the Plastic: Finding 0-Days in IoT Devices” on Tuesday, Nov. 18. Learn hands-on techniques for uncovering hidden vulnerabilities in consumer IoT devices and advancing your IoT security research skills.

Watch Session
Reports

Product Security Reviews: The Basics Are Still the Breach

Product Security Reviews: The Basics Are Still the Breach

The Product Security Reviews Report is a data-driven analysis that distills two years of hands-on testing across healthcare, IoT, industrial, and financial systems into a single, sobering insight: attackers don’t need sophistication when simplicity still works. This guide helps security leaders understand why fundamental flaws remain the root cause of breaches—and how to turn that reality into a roadmap for measurable improvement.

Read Report
Virtual Sessions

The Basics are the Breach: Lessons from Real-World Product Security Reviews

The Basics are the Breach: Lessons from Real-World Product Security Reviews

In this live virtual session, you’ll explore two years of product testing across healthcare, IoT, industrial, and financial systems—and see how “basic” vulnerabilities continue to cause the biggest damage. Learn how small oversights like default credentials, broken cryptography, and insecure configurations can be chained into full-scale breaches, and what you can do to stop them.

Watch Session
Datasheets

AI & LLM Security Testing Datasheet

AI & LLM Security Testing Datasheet

Understanding your exposure is essential to building secure and resilient AI systems. Bishop Fox AI/LLM security assessments provide the experience and expertise to help you navigate this emerging threat landscape.

Download Datasheet
Workshops & Training

Demystifying 5G Security: Understanding the Registration Protocol

Demystifying 5G Security: Understanding the Registration Protocol

In this hands-on workshop, Senior Security Consultant Drew Jones will break down the fundamentals of the 5G registration protocol, explore where security gaps can emerge, and walk through a live simulated lab demonstrating real-world vulnerabilities.

Watch Workshop
Virtual Sessions

Fireside Chat - SaaS Security: Inside Recent Attacks Disrupting Global Enterprises

Fireside Chat - SaaS Security: Inside Recent Attacks Disrupting Global Enterprises

Two recent cyberattacks crippled global enterprises by exploiting Salesforce OAuth mechanisms. Join CISO Christie Terrill and former Salesforce security leader Brian Soby for an exclusive breakdown of these breaches and actionable defense strategies in this live fireside chat.

Watch Session
Virtual Sessions

CloudFox: Cloud Enumeration for Penetration Testing

CloudFox: Cloud Enumeration for Penetration Testing

In this session, Mitchell Sperling, Senior Security Consultant at Bishop Fox, will demonstrate how he uses CloudFox during cloud penetration tests to quickly enumerate large cloud environments and identify interesting attack paths.

Watch Session
Guides

LLM-Assisted Vulnerability Research

LLM-Assisted Vulnerability Research

Explore Bishop Fox's experimental research into applying Large Language Models to vulnerability research and patch diffing workflows. This technical guide presents methodology, data, and insights from structured experiments testing LLM capabilities across high-impact CVEs, offering a transparent look at where AI shows promise and where challenges remain.

Read Guide
Executive Briefing

Scaling Application Security: Lessons from Salesforce AppExchange

Scaling Application Security: Lessons from Salesforce AppExchange

Join top security leaders from Bishop Fox, AppOmni, and Guidewire as they reveal how Salesforce AppExchange set the standard for scalable SaaS security—packed with real-world insights to future-proof your security strategy.

Read Briefing
Virtual Sessions

AI War Stories: Silent Failures, Real Consequences

AI War Stories: Silent Failures, Real Consequences

AI doesn’t crash when compromised—it complies. Join Jessica Stinson as she shares real-world AI security failures, revealing how trusted tools are silently hijacked. Learn to spot hidden risks and build resilient AI defenses before silence turns into breach.

Watch Session
Customer Stories

Red Team Activated: Testing a Global Risk Intelligence Platform

Red Team Activated: Testing a Global Risk Intelligence Platform

To ensure its real-time AI platform could withstand sophisticated threats, a global SaaS company partnered with Bishop Fox for its first full red team assessment.

Read Story
Customer Stories

Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance

Enhancing AI Security: How Ventrilo.ai Revolutionizes Writing Assistance

Ventrilo.ai partnered with Bishop Fox for application penetration testing and AI security assessments to ensure its writing assistant protects sensitive user data and withstands real-world threats.

Read Story
Guides

Red Team Readiness Guide

Red Team Readiness Guide

The Red Team Readiness Guide is a practical, question-driven planning framework that helps security leaders align stakeholders, clarify objectives, and evaluate organizational readiness ahead of a Red Team engagement. Use it to avoid common pitfalls, define business-relevant goals, and set the stage for maximum impact.

Read Guide
Solution Briefs

The Human Element of AI Security Solution Brief

The Human Element of AI Security Solution Brief

Learn how expert-driven testing goes beyond automation to thoroughly assess AI and LLM applications with techniques grounded in human behavior and social engineering.

Read Briefing
Guides

Red Team Readiness Assessment

Red Team Readiness Assessment

The Red Team Readiness Assessment is a guided self-assessment worksheet that helps security teams evaluate their preparedness, align stakeholders, and plan more effective Red Team engagements. Use it to define objectives, set scope, and establish the protocols needed for a successful simulation.

Read Guide
Virtual Sessions

Breaking AI: Inside the Art of LLM Pen Testing

Breaking AI: Inside the Art of LLM Pen Testing

Learn why traditional penetration testing fails on LLMs. Join Bishop Fox’s Brian D. for a deep dive into adversarial prompt exploitation, social engineering, and real-world AI security techniques. Rethink how you test and secure today’s most powerful models.

Watch Session
Workshops & Training

Sliver Workshop Part 2: Staging & Automation

Sliver Workshop Part 2: Staging & Automation

In our second workshop, we’ll explore Sliver’s new implant staging process and demonstrate basic CLI automation features. We’ll also walk through Sliver’s supported pivot types for lateral movement, including TCP, and wrap up by exploring automation options using the SliverPy project.

Watch Workshop
Solution Briefs

Red Team & Adversarial Emulation Solution Brief

Red Team & Adversarial Emulation Solution Brief

With a range of approaches that simulate breach scenarios at your organization, adversarial emulation is the most effective way to know if your team is prepared to detect, respond, and recover—before a real breach happens.

Read Briefing
Virtual Sessions

Architecting Cloud Security Testing in the GenAI Era

Architecting Cloud Security Testing in the GenAI Era

Join Steven Smiley and Jessica Stinson for a deep dive into how early-stage architectural reviews can transform the effectiveness of your testing. Whether you're navigating IAM setups or preparing to tackle GenAI risks in cloud environments, this session has the clarity and direction you need to test smarter—not just harder.

Watch Session
Workshops & Training

Sliver Workshop Part 1: Getting Started & 1.6 Features

Sliver Workshop Part 1: Getting Started & 1.6 Features

Watch an interactive workshop led by Bishop Fox Senior Security Consultant, Tim Ghatas, as we dive into Sliver, the open-source C2 framework making waves in Red Team ops.

Watch Workshop
Executive Briefing

Panel: PCI DSS 4.0 Expert Breakdown

Panel: PCI DSS 4.0 Expert Breakdown

This executive brief features an expert discussion focusing on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing.

Read Briefing
Virtual Sessions

Attacking & Defending Deepfakes: A Red Teamer’s Perspective

Attacking & Defending Deepfakes: A Red Teamer’s Perspective

Explore the offensive and defensive use of deepfake technology in cybersecurity with Bishop Fox red teamer Brandon Kovacs. This session dives into real-world attack simulations, red team methodologies, and practical mitigation strategies for organizations facing the rapidly growing threat of deepfakes.

Watch Session
Virtual Sessions

Attack Surface Management: Measuring Real-World Impact

Attack Surface Management: Measuring Real-World Impact

Our experts explain how to tell if your ASM is effective, what teams often miss, and why it’s more than just tracking known vulnerabilities.

Watch Session

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.