In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.
OWASP ASVS: Unlocking Stronger Application Security
Join offensive security expert Shanni Prutchi in this livestream as she shares her analysis of the 278 verification requirements listed in OWASP's Application Security Verification Standard (ASVS). Learn how to generate test cases and gain insights to effectively test your applications against the standard.
Strengthening Incident Response: Combining Tabletop Exercises with Red Team Engagements
Learn how integrating tabletop exercises with red team assessments creates a more comprehensive evaluation of your organization's incident response capabilities. Security expert Shanni Prutchi shares practical approaches for testing both your technical controls and response processes against realistic attack scenarios.
Cosmos: Protecting the Perimeter
To understand the vulnerability landscape that organizations are up against, we meticulously examined 17,000 data points, extracted from over 110 billion automations, within a 12-month period. Download the report to view a comprehensive propensity model that allows security and organizational leadership to visualize the potential impact of leaving vulnerable exposures to chance.
The Offensive Security Blueprint for Financial Services
Bishop Fox's Financial Services industry cut provides a comprehensive analysis of offensive security trends within financial services, using industry data gathered from our joint research report with the Ponemon Institute.
Red Teaming: The Essential Tool for Security Leaders
Join Trevin Edgeworth, Red Team Practice Director at Bishop Fox, as he sheds light on why Red Teaming has become the ultimate "sanity check" for security team leaders.
"Hacker's Arsenal in AppSec" Session - DEF CON 31
In this session, we investigate how applications are the beating heart of the digital realm, and as hackers, we know just how to make them skip a beat.
"Exploiting the Cloud" Session - DEF CON 31
In this session, we take a deep dive into the cloud's underbelly, exploring its vulnerabilities and exploiting its weaknesses.
"Mastering Your Tools Session" - DEF CON 31
In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of the most elite organizations worldwide.
"Red Teaming" Session - DEF CON 31
In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.
An Interview with Chris Kirsch, CEO & Co-Founder of runZero - DEF CON 31
In this session, hear from Chris Kirsch, CEO and co-founder of runZero.
An Interview with Tom Hudson, Senior Security Engineer at Bishop Fox - DEF CON 31
In this session, we talk with Tom Hudson who is a Senior Security Engineer at Bishop Fox, where he is part of the Capability Development team for Cosmos.
An Interview with Chloe Messdaghi, Head of Threat Research at Protect AI - DEF CON 31
In this session, hear from Chloé Messdaghi, an accomplished security executive with a proven track record of advising and developing solutions.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.