AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Virtual Sessions

Virtual session graphic titled “AI & Security Risks: A Cyber Leadership Panel,” focused on AI security risks and executive cybersecurity strategy.
Virtual Sessions

AI & Security Risks: A Cyber Leadership Panel

Watch a fireside chat with cybersecurity and AI leaders on today’s real AI security risks. Learn where risk is emerging, how leaders set ownership, the true cost of securing AI, and practical steps teams use to protect AI systems and data.

Watch Session
Virtual session graphic titled “Application Security: Getting More Out of Your Penetration Tests,” focused on improving application penetration testing value..
Virtual Sessions

Application Security: Getting More Out of Your Pen Tests

Application pen tests cost real time and money. Learn how to get real value from them. Bishop Fox lead researcher Dan Petro explains what good app tests include, how to evaluate AI-powered testing, and the questions that matter before and after an engagement.

Watch Session
Virtual Session Red Team The Essential Tool for Security Leaders with black and white background and white and red text.
Virtual Sessions

Red Teaming: The Essential Tool for Security Leaders

Watch Trevin Edgeworth, Red Team Practice Director at Bishop Fox, in this virtual session where he will break down how Red Teaming gives leaders the clarity, evidence, and narrative they need to make informed, high-stakes decisions in the current AI landscape.

Watch Session
Virtual session banner titled “Peeling Back the Plastic: Finding 0-Days in IoT Devices” — cybersecurity webcast about discovering zero-day vulnerabilities in Internet of Things hardware.
Virtual Sessions

Peeling Back the Plastic: Finding 0-Days in IoT Devices

Join Senior Security Consultant Nick Cerne for “Peeling Back the Plastic: Finding 0-Days in IoT Devices” on Tuesday, Nov. 18. Learn hands-on techniques for uncovering hidden vulnerabilities in consumer IoT devices and advancing your IoT security research skills.

Watch Session
Virtual session titled ‘The Basics Are the Breach: Lessons from Real-World Product Security Reviews’ — cybersecurity webinar graphic with black background and modern yellow and gray accents.
Virtual Sessions

The Basics are the Breach: Lessons from Real-World Product Security Reviews

In this live virtual session, you’ll explore two years of product testing across healthcare, IoT, industrial, and financial systems—and see how “basic” vulnerabilities continue to cause the biggest damage. Learn how small oversights like default credentials, broken cryptography, and insecure configurations can be chained into full-scale breaches, and what you can do to stop them.

Watch Session
Fireside chat title: Fireside Chat - SaaS Security: Inside Recent Attacks Disrupting Global Enterprises and code showing on a white background.
Virtual Sessions

Fireside Chat - SaaS Security: Inside Recent Attacks Disrupting Global Enterprises

Two recent cyberattacks crippled global enterprises by exploiting Salesforce OAuth mechanisms. Join CISO Christie Terrill and former Salesforce security leader Brian Soby for an exclusive breakdown of these breaches and actionable defense strategies in this live fireside chat.

Watch Session
CloudFox workshop on cloud enumeration techniques for penetration testing.
Virtual Sessions

CloudFox: Cloud Enumeration for Penetration Testing

In this session, Mitchell Sperling, Senior Security Consultant at Bishop Fox, will demonstrate how he uses CloudFox during cloud penetration tests to quickly enumerate large cloud environments and identify interesting attack paths.

Watch Session
Virtual event titled
Virtual Sessions

AI War Stories: Silent Failures, Real Consequences

AI doesn’t crash when compromised—it complies. Join Jessica Stinson as she shares real-world AI security failures, revealing how trusted tools are silently hijacked. Learn to spot hidden risks and build resilient AI defenses before silence turns into breach.

Watch Session
Promotional banner for virtual session titled 'Breaking AI: Inside the Art of LLM Pen Testing' featuring stylized graphics of a laptop and glitch art design elements.
Virtual Sessions

Breaking AI: Inside the Art of LLM Pen Testing

Learn why traditional penetration testing fails on LLMs. Join Bishop Fox’s Brian D. for a deep dive into adversarial prompt exploitation, social engineering, and real-world AI security techniques. Rethink how you test and secure today’s most powerful models.

Watch Session
Virtual session titled 'Architecting Cloud Security Testing in the GenAI Era' featuring modern typography and abstract technical design elements.
Virtual Sessions

Architecting Cloud Security Testing in the GenAI Era

Join Steven Smiley and Jessica Stinson for a deep dive into how early-stage architectural reviews can transform the effectiveness of your testing. Whether you're navigating IAM setups or preparing to tackle GenAI risks in cloud environments, this session has the clarity and direction you need to test smarter—not just harder.

Watch Session
Attacking & Defending Deepfakes: A Red Teamer’s Perspective featured image with Bishop Fox new branding of easter eggs.
Virtual Sessions

Attacking & Defending Deepfakes: A Red Teamer’s Perspective

Explore the offensive and defensive use of deepfake technology in cybersecurity with Bishop Fox red teamer Brandon Kovacs. This session dives into real-world attack simulations, red team methodologies, and practical mitigation strategies for organizations facing the rapidly growing threat of deepfakes.

Watch Session
Attack Surface Management Measuring Real World Impact Webcast featured image.
Virtual Sessions

Attack Surface Management: Measuring Real-World Impact

Our experts explain how to tell if your ASM is effective, what teams often miss, and why it’s more than just tracking known vulnerabilities.

Watch Session
Screenshot of
Virtual Sessions

The Promise and Perils of AI: Navigating Emerging Cyber Threats - A Dark Reading Panel

This video showcases leading voices in cybersecurity explaining their examinations into how AI is simultaneously transforming cyber defense and supercharging attacker capabilities. Together, they explored how GenAI is reshaping the threat landscape and what security leaders must do to adapt.

Watch Session
Panel discussion on building cybersecurity companies featuring women leaders Christie Terrill of Bishop Fox, Deidre Diamond of CyberSN, and Juliet Okafor of RevolutionCyber.
Virtual Sessions

Building Cybersecurity Companies: Stories and Lessons from Two Women Founders

Christie Terrell, CISO at Bishop Fox, interviews Deidre Diamond, Founder & CEO of CyberSN and Founder of Secure Diversity, and Juliet Okafor, Founder & CEO of RevolutionCyber about their experiences founding their own companies in the cybersecurity industry.

Watch Session
Black and white vintage historical sign of Deadwood, South Dakota
Virtual Sessions

Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security

Watch Alethe Denis, Senior Security Consultant, for an engaging deep dive into the world of Red Teaming. Through real-life stories and expert analysis, this webcast will explore the triumphs, missteps, and critical takeaways from Red Team engagements.

Watch Session
Webcast preview card with Trevin Edgeworth headshot
Virtual Sessions

Red Teaming: Is Your Security Program Ready for the Ultimate Test?

In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.

Watch Session
Video Alethe Denis WWHF 2024
Virtual Sessions

Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security

Senior Security Consultant Alethe Denis takes audiences on a riveting journey into the realm of Red Teaming through captivating narratives and insightful analysis.

Watch Session
Headshots of Bishop Fox experts Trevin Edgeworth, Rob Ragan, and Matt Twells
Virtual Sessions

Achieving DORA Threat-Led Penetration Testing Requirements

Gain in-depth view into DORA’s threat-led penetration testing framework with practical guidance on how to integrate offensive security services.

Watch Session
video thumnail of DragonJAR Forum organizers and Hector Cruz.
Virtual Sessions

Red vs Blue: Building a Well-Rounded Cybersecurity Career Path

Hear from Héctor Cuevas Cruz as he shares his career from early days in DragonJAR forum to how he's become a team leader of hackers for Bishop Fox.

Watch Session
Headshot of Senior Security Consultant Brandon Kovacs
Virtual Sessions

Cyber Mirage: How AI is Shaping the Future of Social Engineering

In this webcast, Senior Security Consultant Brandon Kovacs aims to illuminate the sophisticated capabilities that AI brings to the table in creating hyper-realistic deepfakes and voice clones.

Watch Session
2024 Q3 Livestream Def Con General Tile
Virtual Sessions

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Watch Session
Bishop Fox Livestream RSAC 2024 IAM in Cloud Environments
Virtual Sessions

Navigating the IAM Maze: Expert Strategies for Cloud Identity Security

In this expert-led session, security leaders discuss the critical challenges and solutions for managing identities in complex cloud environments. Learn how to tackle machine identities, implement continuous hygiene practices, and leverage AI for enhanced security posture.

Watch Session
Bishop Fox Livestream RSAC 2024 Daniel Wallance Justin Greis
Virtual Sessions

Speaking Board Language: Translating Cybersecurity for Executive Leadership

McKinsey cybersecurity leaders share essential strategies for translating complex security challenges into business-focused board discussions. Learn how to effectively communicate risk, establish meaningful metrics, and build productive partnerships with your organization's leadership.

Watch Session
Bishop Fox Livestream RSAC 2024 Nate Lee
Virtual Sessions

The Human Element: Building Trust and Influence in Security Leadership

Veteran security leader Nate Lee reveals how effective cybersecurity depends as much on relationship-building as technical expertise. Learn practical strategies for gaining organizational trust, communicating effectively, and driving security initiatives through persuasion rather than mandate.

Watch Session

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.