Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Featured Resource

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.

video thumnail of DragonJAR Forum organizers and Hector Cruz
Virtual Session

Blue Team or Red Team?

Hear from Héctor Cuevas Cruz as he shares his career from early days in DragonJAR forum to how he's become a team leader of hackers for Bishop Fox.

Headshot of Senior Security Consultant Brandon Kovacs
Virtual Session

Cyber Mirage: How AI is Shaping the Future of Social Engineering

In this webcast, Senior Security Consultant Brandon Kovacs aims to illuminate the sophisticated capabilities that AI brings to the table in creating hyper-realistic deepfakes and voice clones.

Adversarial Controls Testing Methodology cover page preview on dark background.
Methodology

Bishop Fox Adversarial Controls Testing Methodology

Download our methodology document to learn about our adversarial, attack-based approach to testing your key security controls.

Bishop Fox Application Penetration Testing Packages methodology document preview, showcasing summary of engagement, process steps, and assessment scope.
Methodology

Bishop Fox Application Penetration Testing Packages Methodology

This methodology document provides an overview of how Bishop Fox conducts our standardized application penetration testing services.

2024 Q3 Livestream Def Con General Tile
Virtual Session

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Traeger Video Card Template
Workshops & Training

Where there’s smoke…: How a Traeger vulnerability could have put grilling season at risk

Bishop Fox Security Consultant, Nisk Cerne discovered and worked with Traeger Grills to disclose a vulnerability in the company’s embedded Wi-Fi Controller that allows users to connect to and control their grills remotely.

Headshot with Alissa Gilbert and livestream title, "Come WiFind Me"
Workshops & Training

Come WiFind Me: WiFi & Other RF Surveillance

Join Alissa Gilbert (dnsprincess) as she dispels myths around RF tracking, negates some fears, and gives completely new ones in its place.

Bishop Fox Livestream RSAC 2024 IAM in Cloud Environments
Virtual Session

Navigating the IAM Maze: Expert Strategies for Cloud Identity Security

In this expert-led session, security leaders discuss the critical challenges and solutions for managing identities in complex cloud environments. Learn how to tackle machine identities, implement continuous hygiene practices, and leverage AI for enhanced security posture.

Bishop Fox Livestream RSAC 2024 Daniel Wallance Justin Greis
Virtual Session

Speaking Board Language: Translating Cybersecurity for Executive Leadership

McKinsey cybersecurity leaders share essential strategies for translating complex security challenges into business-focused board discussions. Learn how to effectively communicate risk, establish meaningful metrics, and build productive partnerships with your organization's leadership.

Headshots of David Etue and Nick Selby
Virtual Session

Intelligence That Matters: Building Cyber Threat Programs That Drive Business Value

Veteran intelligence leaders David Etue and Nick Selby reveal what separates effective cyber threat intelligence from mere data collection. Learn how to develop intelligence capabilities that communicate meaningful risk to executives and deliver actionable insights to technical teams.
Bishop Fox Livestream RSAC 2024 Application Security
Virtual Session

Beyond Whack-a-Mole: Modern AppSec Strategies for High-Growth Companies

Security leaders from Reddit, Meta, and SeatGeek share battle-tested approaches for scaling application security in fast-moving environments. Learn how these organizations are shifting from vulnerability hunting to building secure-by-default ecosystems that empower rather than hinder development teams.
Bishop Fox Livestream RSAC 2024 Nate Lee
Virtual Session

The Human Element: Building Trust and Influence in Security Leadership

Veteran security leader Nate Lee reveals how effective cybersecurity depends as much on relationship-building as technical expertise. Learn practical strategies for gaining organizational trust, communicating effectively, and driving security initiatives through persuasion rather than mandate.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.