AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Virtual Sessions

Beyond Whack-a-Mole: Modern AppSec Strategies for High-Growth Companies

Beyond Whack-a-Mole: Modern AppSec Strategies for High-Growth Companies

Security leaders from Reddit, Meta, and SeatGeek share battle-tested approaches for scaling application security in fast-moving environments. Learn how these organizations are shifting from vulnerability hunting to building secure-by-default ecosystems that empower rather than hinder development teams.

Watch Session
Virtual Sessions

The Human Element: Building Trust and Influence in Security Leadership

The Human Element: Building Trust and Influence in Security Leadership

Veteran security leader Nate Lee reveals how effective cybersecurity depends as much on relationship-building as technical expertise. Learn practical strategies for gaining organizational trust, communicating effectively, and driving security initiatives through persuasion rather than mandate.

Watch Session
Virtual Sessions

Beyond Technical Exploits: The Strategic Value of Red Team Engagements

Beyond Technical Exploits: The Strategic Value of Red Team Engagements

Security researcher and YouTube educator John Hammond shares insights on effective red teaming that balances technical depth with business impact. Learn how threat intelligence, fundamentals-focused security, and emerging technologies shape today's offensive security landscape.

Watch Session
Virtual Sessions

Managing SaaS Sprawl: Building Security Into Your Multi-Vendor Ecosystem

Managing SaaS Sprawl: Building Security Into Your Multi-Vendor Ecosystem

Marketing executive Charrah Hardamon shares insights on tackling the security challenges of modern SaaS ecosystems. Learn practical approaches to managing vendor relationships, implementing appropriate controls, and addressing AI integration without compromising data security.

Watch Session
Virtual Sessions

The Human Side of Security Leadership: Building Teams That Thrive

The Human Side of Security Leadership: Building Teams That Thrive

Veteran security leader Dave Lewis shares his philosophy on transforming struggling teams into high-performers through trust, communication, and empathy. Learn practical approaches to leadership that enable both individual growth and organizational security.

Watch Session
Virtual Sessions

AI's Dark Potential: Robert Hansen, RSnake and Author of AI's Best Friend, Warns of Superintelligence Risks

AI's Dark Potential: Robert Hansen, RSnake and Author of AI's Best Friend, Warns of Superintelligence Risks

Security pioneer Robert "RSnake" Hansen shares insights from his book "AI's Best Friend," revealing why artificial intelligence without moral frameworks poses unprecedented dangers that regulation alone cannot address.

Watch Session
Virtual Sessions

Testing LLM Algorithms While AI Tests Us

Testing LLM Algorithms While AI Tests Us

The presentation delves into securing AI & LLMs, covering threat modeling, API testing, red teaming, emphasizing robustness & reliability, sparking conversation on our interactions with GenAi.

Watch Session
Executive Briefing

Behind closed (but vulnerable) doors: How do we get research like Unsaflok?

Behind closed (but vulnerable) doors: How do we get research like Unsaflok?

Justin Rhinehart distills for us and the broader public how this type of “marquee” research comes to market in an ethical and responsible way. Watch Now!

Read Briefing
Virtual Sessions

Bishop Fox RSAC 2024 Livestream

Bishop Fox RSAC 2024 Livestream

Join us for our 2nd Annual Bishop Fox RSAC Livestream event - an electrifying convergence where innovation meets expertise in the realm of cybersecurity.

Watch Session
Virtual Sessions

Cyber Resilience: Tactics for Post-Attack Recovery 

Cyber Resilience: Tactics for Post-Attack Recovery 

Join Christie Terrill and Tom Eston as they share practical advice on the proactive security measures you can take today and provide a space to ask our security experts your most pressing questions.

Watch Session
Virtual Sessions

Mitigate Third-Party Risks by Strengthening Security Foundations

Mitigate Third-Party Risks by Strengthening Security Foundations

Hear from Anirban Banerjee, CEO and Co-founder of Riscosity, and Matt Twells, Sr. Solution Architect at Bishop Fox, as they explore critical considerations for developing a security program that prioritizes third-party risk reduction.

Watch Session
Virtual Sessions

Women in Cybersecurity: Breaking Codes, Breaking Barriers

Women in Cybersecurity: Breaking Codes, Breaking Barriers

Tune into our special livestream event where we highlight the remarkable achievements of women in the field of cybersecurity, celebrating their contributions during Women's History Month.

Watch Session
Virtual Sessions

Pathways in Security: 21 Questions with Attack Surface Analyst Sarah Muriel

Pathways in Security: 21 Questions with Attack Surface Analyst Sarah Muriel

Get to know our Lady Foxes in our "21 Questions with Bishop Fox" video series. In this episode, hear from Sarah Muriel, Attack Surface Analyst

Watch Session
Virtual Sessions

Women in Cybersecurity: 21 Questions with Security Consultant Lindsay Von Tish

Women in Cybersecurity: 21 Questions with Security Consultant Lindsay Von Tish

Get to know our Lady Foxes in our "21 Questions with Bishop Fox" video series. In this episode, hear from Lindsay Von, Security Consultant II.

Watch Session
Virtual Sessions

Beyond Checkbox Compliance: Maximizing Security Value from PCI DSS Penetration Testing

Beyond Checkbox Compliance: Maximizing Security Value from PCI DSS Penetration Testing

Security Consultant Derek Rush shares how organizations can transform mandatory PCI penetration tests from compliance exercises into meaningful security assessments by following industry guidance and adopting attacker-focused methodologies.

Watch Session
Executive Briefing

The Zero-Day Arms Race: Why Asset Management Trumps Vulnerability Whack-a-Mole

The Zero-Day Arms Race: Why Asset Management Trumps Vulnerability Whack-a-Mole

Caleb Gross, Director of Capability Development, gives his insight on the dynamics of exploit creation and execution and what organizations can do to not only mitigate risk from this event, but also stay focused on minimizing exposure across the business.

Read Briefing
Virtual Sessions

Exploiting Java Deserialization in GWT: From Detection to Command Execution

Exploiting Java Deserialization in GWT: From Detection to Command Execution

Watch our exclusive livestream with Ben Lincoln, Managing Principal at Bishop Fox, to learn about GWT web application vulnerabilities, exploitation strategies, and security enhancement recommendations.

Watch Session
Workshops & Training

Sliver Mastery: Dominating Active Directory Through Advanced Trust Exploitation

Sliver Mastery: Dominating Active Directory Through Advanced Trust Exploitation

Senior security expert Jon Guild demonstrates how to use the Sliver C2 framework to develop advanced offensive security skills. Arm yourself with the knowledge and skills of enumeration, lateral movement, and escalation techniques from first-hand experience in a vulnerable lab environment.

Watch Workshop
Executive Briefing

What Unpatched Vulnerabilities Reveal: A Red Teamer's Perspective by Trevin Edgeworth, Director of Red Team

What Unpatched Vulnerabilities Reveal: A Red Teamer's Perspective by Trevin Edgeworth, Director of Red Team

Bishop Fox's Red Team Director, Trevin Edgeworth, spotlights two notable vulnerabilities - left unpatched for years on end and discusses how unpatched vulnerabilities can wreak havoc on businesses. One, an unpatched six-year-old flaw in Microsoft Office, the other in Google Web Toolkit (GWT), unaddressed for eight years.

Read Briefing
Executive Briefing

Does X Mark a Target? with Trevin Edgeworth, Director of Red Team

Does X Mark a Target? with Trevin Edgeworth, Director of Red Team

In light of the recent security breaches involving Bitcoin and SEC’s X account, our Red Team Practice Director, Trevin Edgeworth, analyzes the role of fluctuating security programs in these incidents. He discusses how attackers exploit confusion, communication gaps, and vague policies, and identifies weak points in shared security responsibility.

Read Briefing
Virtual Sessions

How Does Social Engineering Work? From Planning to Execution

How Does Social Engineering Work? From Planning to Execution

Join our webcast as we navigate the complex terrain of social engineering, offering insights into its various stages from planning to execution, common phishing techniques, and the necessity of ongoing vigilance and proactive strategies to combat this pervasive issue.

Watch Session
Datasheets

Cosmos Datasheet

Cosmos Datasheet

Learn how Cosmos combines attack surface management with expert-driven penetration testing to help security teams identify and remediate dangerous exposures before attackers can exploit them.

Download Datasheet
Datasheets

Cosmos Attack Surface Management (CASM) Datasheet

Cosmos Attack Surface Management (CASM) Datasheet

Learn how this innovative managed service combines advanced attack surface technology with expert-driven testing to help you quickly close the window of vulnerability and strengthen resilience against ever-changing threats.

Download Datasheet
Workshops & Training

CloudFoxable: A Practical Demo of AWS Cloud Security Misconfiguration Attacks

CloudFoxable: A Practical Demo of AWS Cloud Security Misconfiguration Attacks

Watch the CloudFoxable demo to see a gamified cloud hacking sandbox where users can find latent attack paths in an intentionally vulnerable AWS environment.

Watch Workshop

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.