AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Virtual Sessions

AppSec Arsenal: Modern Exploitation Techniques & Advanced Defense Strategies

AppSec Arsenal: Modern Exploitation Techniques & Advanced Defense Strategies

In this session, we investigate how applications are the beating heart of the digital realm, and as hackers, we know just how to make them skip a beat.

Watch Session
Virtual Sessions

Cloud Attack Vectors: Expert Techniques for Finding Critical Vulnerabilities

Cloud Attack Vectors: Expert Techniques for Finding Critical Vulnerabilities

In this session, we take a deep dive into the cloud's underbelly, exploring its vulnerabilities and exploiting its weaknesses.

Watch Session
Virtual Sessions

Offensive Security Arsenal: Building and Mastering Custom Security Tools

Offensive Security Arsenal: Building and Mastering Custom Security Tools

In this session, learn from Bishop Fox experts who are at the cutting-edge of developing tools, technologies, and methodologies which they use to uncover vulnerabilities and offer guidance to some of the most elite organizations worldwide.

Watch Session
Virtual Sessions

Red Team Reality: Advanced Strategies for Modern Attack Simulation

Red Team Reality: Advanced Strategies for Modern Attack Simulation

In this session, learn the secrets of stealthy infiltration, master the latest attack vectors, and discover how to communicate your findings like a true hacker.

Watch Session
Virtual Sessions

The Art of Human Hacking: Social Engineering Success Stories

The Art of Human Hacking: Social Engineering Success Stories

In this session, hear from Chris Kirsch, CEO and co-founder of runZero.

Watch Session
Virtual Sessions

Building Better Security Tools: Inside the Mind of an Open-Source Innovator

Building Better Security Tools: Inside the Mind of an Open-Source Innovator

In this session, we talk with Tom Hudson who is a Senior Security Engineer at Bishop Fox, where he is part of the Capability Development team for Cosmos.

Watch Session
Virtual Sessions

The Human Side of Security: Creating Impact Through Leadership & Advocacy

The Human Side of Security: Creating Impact Through Leadership & Advocacy

In this session, hear from Chloé Messdaghi, an accomplished security executive with a proven track record of advising and developing solutions.

Watch Session
Virtual Sessions

Malware Analysis Mastery: A Conversation with John Hammond

Malware Analysis Mastery: A Conversation with John Hammond

In this session, hear from John Hammond who is a cybersecurity researcher, educator and content creator.

Watch Session
Virtual Sessions

The Pentester's Journey: Expert Insights from a Security Veteran

The Pentester's Journey: Expert Insights from a Security Veteran

In this session, hear from Phillip Wylie, a cybersecurity expert with over 25 years of experience in IT and cybersecurity.

Watch Session
Virtual Sessions

JavaScript Vulnerability Mining: Mastering jsluice for Advanced Web App Testing

JavaScript Vulnerability Mining: Mastering jsluice for Advanced Web App Testing

Tune in to the eleventh episode of our Tool Talk series to hear Tom Hudson speak about jsluice, an open-source, Go package and command-line tool used to extract information from JavaScript files and code.

Watch Session
Virtual Sessions

Hacker Evolution: From Technical Mastery to Visionary Leadership

Hacker Evolution: From Technical Mastery to Visionary Leadership

Join us Friday, August 11, 2023 for a livestream from DEF CON 31 to hear seasoned hackers and cybersecurity experts uncover the intricacies of ethical hacking and how the hacker spirit can be harnessed to push the boundaries of technology.

Watch Session
Guides

Outpacing Adversaries in the Cloud: An Offensive Security Guide

Outpacing Adversaries in the Cloud: An Offensive Security Guide

Download our guide to discover the current challenges in securing the cloud, the approach offensive security takes through cloud penetration testing, and the differences and advantages of investing in CPTs as part of a cloud security program.

Read Guide
Reports

Ponemon Institute Report 2023

Ponemon Institute Report 2023

In a new study conducted with Bishop Fox, the Ponemon Institute surveyed nearly 700 security and IT practitioners who actively employ offensive security practices. The analysis explores where enterprises are focusing offensive security efforts and the drivers behind them.

Read Report
Virtual Sessions

Breaking Down Q2's Critical CVEs: From Discovery to Exploitation

Breaking Down Q2's Critical CVEs: From Discovery to Exploitation

Watch the third episode of our What the Vuln technical series as we share the most intriguing vulnerabilities that we encountered in Q2 2023 and how we hacked them.

Watch Session
Virtual Sessions

Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study

Get the Blueprint: Insights from Ponemon Institute’s 2023 State of Offensive Security Study

Hear from experts Larry Ponemon & Tom Eston, as they reveal our findings from a joint report with the Ponemon Institute on the 'State of Offensive Security' in 2023.

Watch Session
Guides

Getting Red Teaming Right: A How-to Guide

Getting Red Teaming Right: A How-to Guide

Read our eBook to learn how Red Teaming can provide the ultimate training ground for your defenses, assessing how well (or not) intrusions are detected and how an attacker can move throughout your network to achieve exfiltration.

Read Guide
Virtual Sessions

How the New National Cybersecurity Strategy Will Shape the Future of Offensive Security

How the New National Cybersecurity Strategy Will Shape the Future of Offensive Security

Join Bishop Fox for a fireside chat with renowned cybersecurity experts – Evan Wolff & Justin Greis. We’ll discuss how new proposed regulations will impact offensive security initiatives, both short- and long-term.

Watch Session
Guides

OWASP ASVS Demystified: A Practical Guide to Web Application Security Testing

OWASP ASVS Demystified: A Practical Guide to Web Application Security Testing

In this technical guide, offensive security expert Shanni Prutchi provides analysis of the entire 278 verification requirements listed in OWASP's ASVS standard to assist in the generation of test cases and provide context to companies looking to test their applications against the standard.

Read Guide
Reports

IDC Spotlight - Continuous Prevention: How Attack Surface Management Reduces Risk

IDC Spotlight - Continuous Prevention: How Attack Surface Management Reduces Risk

Get new analyst insights on the benefits of continuous testing.

Read Report
Virtual Sessions

Notes from the Dark Side: What Our Data Reveals About the Attack Surface

Notes from the Dark Side: What Our Data Reveals About the Attack Surface

Join our offensive security experts as they share insights gleaned from analyzing twelve months of findings captured in Cosmos, our award-winning attack surface management platform.

Watch Session
Workshops & Training

Powering Up Burp Suite: Building Custom Extensions for Advanced Web Application Testing

Powering Up Burp Suite: Building Custom Extensions for Advanced Web Application Testing

Learn how to power up web application security testing with tips on creating customized extensions featuring BurpCage, an extension that replaces any image proxied through Burp Suite leveraging the Montoya API.

Watch Workshop
Methodologies

Bishop Fox Social Engineering Methodology

Bishop Fox Social Engineering Methodology

Get Bishop Fox's social engineering testing methodology. See how we simulate phishing, vishing, and physical attacks to strengthen your security awareness.

Read Methodology
Methodologies

Bishop Fox Tabletop Exercise Methodology

Bishop Fox Tabletop Exercise Methodology

Download Bishop Fox's IR tabletop exercise methodology to understand how we develop realistic attack scenarios, facilitate collaborative exercises, and assess your organization's incident response readiness.

Read Methodology
Guides

Cybersecurity Style Guide v2.0

Cybersecurity Style Guide v2.0

Designed for security researchers, this guide is an invaluable resource for advice on which cybersecurity terms to use in reports and how to use them correctly.

Read Guide

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.