AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Bishop Fox's Ransomware Readiness eBook with compass imagery
Guides

The Offensive Security Guide to Ransomware Readiness

Our ransomware readiness guide helps you understand your current state of ransomware readiness, prepare for ransomware attacks, identify gaps in your current strategy, and measure progress to continually enhance readiness.

Read Guide
Ransomware readiness self-assessment guide cover and 2 white pages showing a questionnaire and one purple and black cover page with a maze and blue writing Ransomware self Readiness guide. All on dark purple to black background.
Worksheets

Ready or Not: A Ransomware Readiness Self-Assessment

Fill out Bishop Fox’s ransomware readiness self-assessment to see how your program stacks up to rigorous offensive security preparation.

Download Worksheet
The Art & Science of Cyber Leadership interview featuring  Interview with Marene Allison, Former Global CISO at Johnson & Johnson.
Virtual Sessions

An Interview with Marene Allison, Former Global CISO at Johnson & Johnson: From West Point Pioneer to Global CISO

In this session, hear from Marene Allison who is a former Global CISO at Johnson & Johnson and responsible for protecting the company’s information technology systems and business data worldwide

Watch Session
The Art & Science of Cyber Leadership interview featuring headshot of Ernie Bio, Managing Partner, Forgepoint Capital.
Virtual Sessions

From Fighter Jets to Cyber Defense: How Military Experience Shapes Security Investment

Former F-16 pilot turned ForgePoint Managing Director Ernie Bio shares insights on identifying innovative cybersecurity startups, the evolving role of CISOs, and why the combination of AI with human expertise represents security's most promising frontier.

Watch Session
The Art & Science of Cyber Leadership interview featuring Wendy Nather, Head of Advisory CISO at Cisco.
Virtual Sessions

Strategic Insights from Wendy Nather Cisco's Advisory CISO Leader

Hear from Wendy Nather, Head of Advisory CISOs at Cisco. She is co-author of The Cloud Security Rules, and she was listed as one of SC Magazine‘s women in IT security “power players” in 2014, as well as an “influencer” in the Reboot Leadership Awards in 2018; she was also inducted into the Infosecurity Europe Hall of Fame in 2021.

Watch Session
2023 Q2 Cyber Sec Leaders Videos Tile Spotlight Christian Schnedler
Virtual Sessions

Disrupting Cybersecurity: A CISO-Investor's Blueprint for Industry Innovation

Westcap's Christian Schnedler shares his journey from protecting NYC during Occupy Wall Street to identifying the next generation of cybersecurity innovators, revealing why identity management represents the industry's most critical frontier.

Watch Session
The Art & Science of Cyber Leadership featuring Tennisha Martin, Founder of BlackGirlsHack.
Virtual Sessions

Breaking Barriers in Cybersecurity: Leadership Insights from BlackGirlsHack's Founder

In this session, hear from Tennisha Martin who is the founder and Executive Director of BlackGirlsHack (BGH Foundation), a national cybersecurity nonprofit organization dedicated to providing education and resources to underserved communities and increasing the diversity in cyber.

Watch Session
2023 Q2 Cyber Sec Leaders Videos Tile Spotlight Avia Ben Menahem
Virtual Sessions

From Product Security to Incident Response: Strategic Insights from NYDIG's CISO

Former Microsoft security executive Avi Ben-Menachem shares insights on building security teams founded on military values, bridging technical and business perspectives, and adapting security approaches across vastly different technology environments.

Watch Session
The Art & Science of Cyber Leadership interview featuring headshot of Andy Ellis, Author of 1% Leadership.
Virtual Sessions

Leadership Beyond Authority: Building Inclusive Security Culture with Andy Ellis

In this session, hear from Andy Ellis who is a seasoned technology and business executive with deep expertise in security, managing risk, and leading an inclusive culture. He is also the author of 1% Leadership, a handy guidebook that business readers can regularly apply to identify blind spots, boost morale, and solve problems at work.

Watch Session
Bishop Fox with female fox astronaut in Rosie Riveter pose with webcast title: Defend Like A Girl and sub title: Making your way to cyber success.
Virtual Sessions

Defend Like A Girl: Hacking Your Way to Cyber Success

Join our livestream as host Alethe Denis and special guests Lindsay Von Tish, Jessica Stinson, Shanni Prutchi, and Katie Ritchie as they share their experiences as hackers and showcase how you can find success in the rapidly evolving world of cybersecurity.

Watch Session
Webcast title with speakers' headshot: Combatting Adversaries: Proactive Social Engineering & Network Testing.
Virtual Sessions

Combatting Adversaries: Proactive Social Engineering & Network Testing

Explore how sophisticated social engineering techniques bypass traditional security controls, featuring insights from Bishop Fox security experts on realistic attack scenarios and practical defensive strategies.

Watch Session
The art & science of cuber leadership neon logo on dark purple background.
Virtual Sessions

RSA Conference 2023: Leadership Perspectives in Cybersecurity - From CISOs to Founders

Watch from RSA Conference to explore cybersecurity leadership through multiple lenses. Get perspectives from CISOs, industry authorities, cyber-focused investors, and security founders on topics that are top of mind for today’s security leaders.

Watch Session
A cover report imagery with charts and infinity ring
Guides

Shifting Left: A DevSecOps Field Guide

Our eBook offers practical recommendations on how developers and security teams alike can move towards a DevSecOps model in any organization – with a goal of shared responsibility and creating a perpetual and repeatable process.

Read Guide
Penetrating the Cloud title on dark purple background and security consultants, Seth Art & Nate Robb headshots.
Virtual Sessions

Penetrating the Cloud: Uncovering Unknown Vulnerabilities

This presentation from Bishop Fox security experts reveals how attackers exploit common cloud misconfigurations to gain unauthorized access to sensitive data, demonstrating why continuous testing is essential for cloud security.

Watch Session
Webcast on how to prepare for ransomware with real-world playbooks featuring the headshots of Bishop Fox security experts, Tom Eston and Trevin Edgeworth.
Virtual Sessions

Ready or Not? Test Your Ransomware Defenses Against Real-World Playbooks

Join Bishop Fox experts Tom Eston, AVP of Consulting and Trevin Edgeworth, Red Team Practice Director as they breakdown why ransomware emulations are the best way to test your defenses.

Watch Session
Bishop Fox WTV EDR Bypass OG
Workshops & Training

How Attackers Slip Past EDR: A Live Look at LoLBins in Action

Watch the second episode of our What the Vuln livestream series as we explore how to bypass endpoint detection and response (EDR) with native Windows binaries to gain advanced post-exploitation control.

Watch Workshop
Bishop Fox Livestream Zimbra Tile
Workshops & Training

CVE Spotlight: Breaking Down Zimbra’s RCE Vulnerabilities

Watch the inaugural episode of our What the Vuln livestream series as we examine Zimbra Zip Path Traversal vulnerabilities, CVE-2022-27925 and CVE-2022-37042.

Watch Workshop
Tool Talk Episode 9 webcast title in neon letters on dark background with Matt Keeley and Joe Sechman headshots presenting the security tool Spoofy.
Workshops & Training

Spoofy in Action: Advancing Domain Spoofing Detection

Learn how to efficiently identify subdomain takeover vulnerabilities using Spoofy, an open-source tool that automates the assessment process and helps protect your organization from potential subdomain spoofing attacks.

Watch Workshop
Webcast on how emulation techniques provide safe testing scenarios to uncover ransomware susceptibility featuring the headshots of Bishop Fox and Illumio security experts, Trevin Edgeworth and Paul Dant.
Virtual Sessions

Ransomware Emulations: Pressure-Testing Scenarios for Cybersecurity Defense Teams

Join us to learn how ransomware emulation provides safe testing scenarios to uncover ransomware susceptibility in your security environment.

Watch Session
Bishop Fox eBook cover Looking Toward Cosmos: Business Justification for Continuous Penetration Testing.
Guides

Looking Toward the Cosmos: Making the Case for Continuous Offensive Security

Download this eBook to uncover the factors and inputs used in our customizable ROI calculator that are critical to making the business case for continuous offensive testing. The output of the calculator is intended to help you draw a direct line from investment to risk mitigation that can be communicated to both technical and non-technical decision makers.

Read Guide
John Deere Customer Story: Bishop Fox consultants on site to secure John Deere products against cyberattacks.
Customer Stories

John Deere Digital Security Journey: Securing Products Against Cyberattacks

Faced with securing complex, connected products, John Deere relied on in-depth product security reviews and ongoing protection through a managed offensive security platform.

Read Story
SANS and Bishop Fox webcast: Hacker Insights Revealed - Explore new ssurvey results with the cybersecurity experts.
Virtual Sessions

Hacker Insights Revealed: Explore New SANS Survey Results

In partnership with SANS,we share what our latest report uncovers about the minds and methodologies of modern attackers and how this can help to improve your security posture.

Watch Session
Vintage vinyl record sleeve featuring a purple fox with Greatest hits of offensive testing tools in 2022. Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools.
Guides

Greatest Hits: A Compilation of Our Favorite Offensive Testing Tools

What’s better than a Top 10 List? An ultimate guide of all our favorite lists – from red team and cloud penetration tools TO our favorite music to hack to and the best reads for your offensive security journey. We’ve got you covered to level up your penetration testing game with this comprehensive guide of hacking goodies.

Read Guide
Preview of the Bishop Fox Red Teaming methodology on dark background.
Methodologies

Bishop Fox Red Team Methodology

This Red Team methodology document provides an overview of Bishop Fox's approach to Red Team engagements.

Read Methodology

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.