AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Adversarial Controls Testing Datasheet preview with purple background.
Datasheets

Adversarial Controls Testing Datasheet

Learn how Adversarial Controls Testing uses an attack-based approach mapped to the MITRE ATT&CK framework to determine the effectiveness of your email/phishing, endpoint, and network security controls.

Download Datasheet
Headshots of Bishop Fox experts Trevin Edgeworth, Rob Ragan, and Matt Twells
Virtual Sessions

Achieving DORA Threat-Led Penetration Testing Requirements

Gain in-depth view into DORA’s threat-led penetration testing framework with practical guidance on how to integrate offensive security services.

Watch Session
Cosmos for ServiceNow datasheet cover page.
Datasheets

Cosmos for ServiceNow Datasheet

Learn how to effortlessly sync validated exposures from the Cosmos portal into your ServiceNow environment to streamline vulnerability management and remediate dangerous exposures before attackers can exploit them.

Download Datasheet
Bishop Fox Cosmos Service Now Demo
Solution Briefs

Cosmos Integration with ServiceNow® Demo

Watch this video to see how you can streamline vulnerability management — from identification to remediation — with Cosmos integration for ServiceNow.

Read Briefing
Cosmos Jira integration demo tile
Solution Briefs

Cosmos Integration with Jira Demo

Watch this video to see how you can streamline vulnerability management — from identification to remediation — with Cosmos integration for Jira®.

Read Briefing
Mockup of Bishop Fox's Guide to DORA Threat-Led Pen Testing
Guides

FAQ Guide: Acquiring DORA Threat-Led Penetration Testing

Bishop Fox’s comprehensive DORA FAQ guide walks you through everything you need to know about fulfilling these critical requirements. This resource is a must-have for financial institutions looking to stay ahead of DORA’s complex compliance landscape.

Read Guide
video thumnail of DragonJAR Forum organizers and Hector Cruz.
Virtual Sessions

Red vs Blue: Building a Well-Rounded Cybersecurity Career Path

Hear from Héctor Cuevas Cruz as he shares his career from early days in DragonJAR forum to how he's become a team leader of hackers for Bishop Fox.

Watch Session
Headshot of Senior Security Consultant Brandon Kovacs
Virtual Sessions

Cyber Mirage: How AI is Shaping the Future of Social Engineering

In this webcast, Senior Security Consultant Brandon Kovacs aims to illuminate the sophisticated capabilities that AI brings to the table in creating hyper-realistic deepfakes and voice clones.

Watch Session
Bishop Fox Application Penetration Testing Packages Methodology preview on dark background.
Methodologies

Bishop Fox Application Penetration Testing Packages Methodology

Download Bishop Fox's app pen testing packages methodology. Learn our Baseline, Standard, and Advanced approaches to scaling security testing coverage.

Read Methodology
Bishop Fox Adversarial Controls Testing Methodology preview on dark background.
Methodologies

Bishop Fox Adversarial Controls Testing Methodology

Get detailed insights into how Bishop Fox conducts Adversarial Controls Testing (ACT) engagements. This comprehensive methodology document outlines the step-by-step process, collaboration model, example test cases, and delineation of responsibilities critical to validating your security controls.

Read Methodology
2024 Q3 Livestream Def Con General Tile
Virtual Sessions

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Watch Session
Traeger video with headshot of Nick Cerne with Bishop Fox logo.
Workshops & Training

Smart Grills Get Smarter: Improving IoT Security One Device at a Time

Bishop Fox Security Consultant, Nisk Cerne discovered and worked with Traeger Grills to disclose a vulnerability in the company’s embedded Wi-Fi Controller that allows users to connect to and control their grills remotely.

Watch Workshop
Headshot with Alissa Gilbert and livestream title,
Workshops & Training

Come WiFind Me: WiFi & Other RF Surveillance

Join Alissa Gilbert (dnsprincess) as she dispels myths around RF tracking, negates some fears, and gives completely new ones in its place.

Watch Workshop
Bishop Fox Livestream RSAC 2024 IAM in Cloud Environments
Virtual Sessions

Navigating the IAM Maze: Expert Strategies for Cloud Identity Security

In this expert-led session, security leaders discuss the critical challenges and solutions for managing identities in complex cloud environments. Learn how to tackle machine identities, implement continuous hygiene practices, and leverage AI for enhanced security posture.

Watch Session
Bishop Fox Livestream RSAC 2024 Daniel Wallance Justin Greis
Virtual Sessions

Speaking Board Language: Translating Cybersecurity for Executive Leadership

McKinsey cybersecurity leaders share essential strategies for translating complex security challenges into business-focused board discussions. Learn how to effectively communicate risk, establish meaningful metrics, and build productive partnerships with your organization's leadership.

Watch Session
Headshots of David Etue and Nick Selby
Virtual Sessions

Intelligence That Matters: Building Cyber Threat Programs That Drive Business Value

Veteran intelligence leaders David Etue and Nick Selby reveal what separates effective cyber threat intelligence from mere data collection. Learn how to develop intelligence capabilities that communicate meaningful risk to executives and deliver actionable insights to technical teams.

Watch Session
Bishop Fox Livestream RSAC 2024 Application Security
Virtual Sessions

Beyond Whack-a-Mole: Modern AppSec Strategies for High-Growth Companies

Security leaders from Reddit, Meta, and SeatGeek share battle-tested approaches for scaling application security in fast-moving environments. Learn how these organizations are shifting from vulnerability hunting to building secure-by-default ecosystems that empower rather than hinder development teams.

Watch Session
Bishop Fox Livestream RSAC 2024 Nate Lee
Virtual Sessions

The Human Element: Building Trust and Influence in Security Leadership

Veteran security leader Nate Lee reveals how effective cybersecurity depends as much on relationship-building as technical expertise. Learn practical strategies for gaining organizational trust, communicating effectively, and driving security initiatives through persuasion rather than mandate.

Watch Session
Spotlight session featuring John Hammond, Principal Security Researcher at Huntress, hosted by Bishop Fox Live at RSA Conference 2024.
Virtual Sessions

Beyond Technical Exploits: The Strategic Value of Red Team Engagements

Security researcher and YouTube educator John Hammond shares insights on effective red teaming that balances technical depth with business impact. Learn how threat intelligence, fundamentals-focused security, and emerging technologies shape today's offensive security landscape.

Watch Session
Bishop Fox Livestream at RSAC 2024 with Charrah Hardamon
Virtual Sessions

Managing SaaS Sprawl: Building Security Into Your Multi-Vendor Ecosystem

Marketing executive Charrah Hardamon shares insights on tackling the security challenges of modern SaaS ecosystems. Learn practical approaches to managing vendor relationships, implementing appropriate controls, and addressing AI integration without compromising data security.

Watch Session
Bishop Fox Livestream at RSAC 2024 with Dave Lewis
Virtual Sessions

The Human Side of Security Leadership: Building Teams That Thrive

Veteran security leader Dave Lewis shares his philosophy on transforming struggling teams into high-performers through trust, communication, and empathy. Learn practical approaches to leadership that enable both individual growth and organizational security.

Watch Session
Spotlight session featuring Robert Hansen, Managing Director at Grossman Ventures, hosted by Bishop Fox Live during RSA Conference 2024.
Virtual Sessions

AI's Dark Potential: Robert Hansen, RSnake and Author of AI's Best Friend, Warns of Superintelligence Risks

Security pioneer Robert "RSnake" Hansen shares insights from his book "AI's Best Friend," revealing why artificial intelligence without moral frameworks poses unprecedented dangers that regulation alone cannot address.

Watch Session
Headshot of speaker Rob Ragan with copy text
Virtual Sessions

Testing LLM Algorithms While AI Tests Us

The presentation delves into securing AI & LLMs, covering threat modeling, API testing, red teaming, emphasizing robustness & reliability, sparking conversation on our interactions with GenAi.

Watch Session
Video screenshot of security researcher Justin Rhinehart
Executive Briefing

Behind closed (but vulnerable) doors: How do we get research like Unsaflok?

Justin Rhinehart distills for us and the broader public how this type of “marquee” research comes to market in an ethical and responsible way. Watch Now!

Read Briefing

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.