DEF CON 27 (Demo Lab) - Zigbee Hacking: Smarter Home Invasion with ZigDiggity

DEF CON 27 - SpellCheck: The Hacker Spelling Bee

BSides Las Vegas 2019 - Reverse Engineering Mobile Apps: Never Pay for Transit Again

Black Hat USA Arsenal 2019 - Eyeballer: Weaponized Machine Learning to Target Website Screenshots

DEF CON 27 - Finding Secrets In Publicly Exposed EBS Volumes

Black Hat USA 2019 Arsenal - Smarter Home Invasion with ZigDiggity

SummerCon 2019 - Sliver

Cybersecurity Council of Arizona – Cybersecurity Career Conversations

The Diana Initiative - Step 2: Editing, Step 3: Profit

RedSec of Atlanta - Hacking & Hobnobbing

CircleCityCon 6.0 - What the Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing

CircleCityCon 6.0 - Cuckoo Sandbox Setup: Malware Detection Through Detonation

Bishop Fox Sponsors Summercon 2019

THOTCON - What the Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing

DC480 - Cuckoo Sandbox Setup: Malware Detection Through Detonation

Dictionary Society of N. America - How I Compiled a Cybersecurity Style Guide

STE - How the Media Industry Can Achieve Security Success

Kaspersky SAS - Ghost in the Browser: Broad-Scale Espionage with Bitsquatting

SqR00t - Twist & Shout: Ferris Bueller’s Guide to Abuse Domain Permutations

WiCyS 2019 - Red Team Your Resume: Insiders Share Secrets

BSides San Francisco - Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations

University of Advancing Technology - Breaking Into a Career of Breaking In

BSides Columbus 2019 - Check Your Privilege (Escalation)

WOPR Summit - Ham Hacks: Breaking Into Software Defined Radio

Bishop Fox to Speak at BSidesSF 2019

Day of Shecurity - The Path to Security Has Many Branches

Bishop Fox - Live at Day of Shecurity!

Day of Shecurity - Network Pen Testing Tool Kit: Nmap, Netcat, and Metasploit Basics

Day of Shecurity - Introduction to Linux Privilege Escalation Methods

Art Into Science - Pose a Threat: How Perceptual Analysis Helps Bug Hunters

OWASP - AppSec California 2019 - Pose a Threat: How Perceptual Analysis Helps Bug Hunters

NBT5: HackerFight - Traditional Penetration Testing vs Continuous Security & Red Teaming

PCI Conference - The Latest Laws and a Hacker's Perspective

RiskRecon - Third-Party Security Risk Management Practices Roundtable

Practising Law Institute SFO - Cybersecurity: A Hacker's Perspective

Women in Security & Privacy - Network Penetration Test Workshop

Practising Law Institute - Cybersecurity 2018: Managing Cybersecurity Incidents

2018 Cybersecurity Symposium - Breaking Into a Career of Breaking In

University of Advancing Technology - How To Get A Job Panel

University of Advancing Technology - BLTs with Bishop Fox

Bishop Fox Sponsors CactusCon 2018

Practising Law Institute NYC - Cybersecurity: A Hacker's Perspective

CactusCon 2018 - Anatomy of an AppSec Program

Rocky Mountain Safety Conference: Understanding & Responding to Cybersecurity Risks

DEF CON 26 - SpellCheck: The Hacker Spelling Bee

Black Hat USA 2018 Arsenal - Zigdiggity: Zigbee Pentest Toolkit

The Circle of HOPE - SpellCheck: The Hacker Spelling Bee

Cyber Security Summit 2018 - Hackers and Threats

(ISC)2 Phoenix - Effectively Operating a Bug Bounty Program

(ISC)2 Phoenix - Developing and Testing an Effective Incident Response Program

Bishop Fox Sponsors Summercon 2018

Day of Shecurity - Network Penetration Testing Toolkit: Netcat, Nmap, and Metasploit Basics

Chicago Manual of Style Event - Brianne Hughes Talks About The Cybersecurity Style Guide

Empire Hacking NYC Meetup - Server-side Spreadsheet Injections in High Impact Attacks

Estrella Mountain Community College/Mosaic451 - A Cyber Security Round Table

Data Science Meetup - Game Over, Man! Reversing Video Games to Create an Unbeatable AI Player

WiCyS 2018 - Build Me a World Class Security Program in Three Months

Bishop Fox Sponsors WiCyS 2018

Okta Rex Talks - Better Red Than Dead: Elegant Weapons for a More Civilized Age

Kaspersky SAS - 9Tail: Proactive Security Assessment

SOURCE Mesa - Security Needs a Style Guide and Here's V1

2018 Renewable Energy Law Conference - Gamification of Incident Response

O'Reilly Security Podcast - Christie Terrill

SANS Core NetWars Tournament of Champions

O'Reilly Security Conference - Build Me a World Class Security Program in Three Months

DeadDrop SF Meetup - Better Red Than Dead: Elegant Weapons For A More Civilized Age

CactusCon - Red Team Your Resume: Tips From An Insider

CactusCon - Chaos in the Machine: Why Security Needs a Style Guide

Smash the Record 2017 - SmashBot vs. The Baddies

Practising Law Institute – Cybersecurity: A Hacker’s Perspective

(ISC)2 Phoenix – Let's Play a Game: Why Incident Response Matters

Bishop Fox Introduces Hacking AI "DeepHack" at DEF CON 25

DEF CON 25 - Game of Drones: Putting the Emerging 'Drone Defense' Market to the Test

DEF CON 25 - Weaponizing Machine Learning: Humanity Was Overrated Anyway

Bishop Fox Sponsors SummerCon 2017

Black Hat USA 2017 Arsenal Theater Demo - Game of Drones

Interop ITX - Developing and Testing an Effective Incident Response Program

Bishop Fox to Speak at Interop

Estrella Mountain Community College - Breaking Into Cybersecurity

The Hacking Club at SFSU - All About Infosec

Bishop Fox to Present "Highway to the Danger Drone"

Women in Cybersecurity Conference 2017 - Cybersecurity Incident Response Panel

ISSA Phoenix - There and Back Again: A Security Consultant's Tale

Bishop Fox Partner Christie Terrill to Present at Dark Reading Webinar and Conference

Interop ITX - Defeating Social Engineering, BECs & Phishing

QCon London - Continuous Dis-Integration: Red Team Attacks

QCon London - Out of the Browser Into the Fire

Bishop Fox Sponsors MITCTF 2017

82nd Annual Kentucky Society of Professional Engineers Convention - Highway to the Danger Drone

Bishop Fox to Discuss How to Create a Security Blueprint Using the CIS 20 at Cloud IT Live

2016 Kennesaw State’s Cyber Security Awareness Day – Exploiting Smart Devices

DerbyCon 6.0 - SmashBot Shoutout in Keynote

Practising Law Institute - Cybersecurity: A Hacker's Perspective

Dragon Con - Women in Science and Tech Careers

Dragon Con - Hacking 101

DEF CON 24 - Game Over, Man! - Reversing Video Games to Create an Unbeatable AI Player

Bishop Fox to Speak at Black Hat and DEF CON 2016

Black Hat USA 2016 Arsenal - Highway to the Danger Drone

Black Hat USA 2016 - Highway to the Danger Drone - Arsenal Theater Demo

Arizona Technology Council 2016 Cybersecurity Summit - Internet of Things Panel

CactusCon - Developing and Testing an Effective Incident Response Program

CactusCon - Telling Lies & Making Friends: Penetrating People's Emotional Barriers

SANS Internet Storm Center - ISC StormCast for Sunday, April 10th 2016

The Hacking Club at SFSU - Ethical Hacker Career Day

Bishop Fox Sponsors CactusCon 2016

Interop Las Vegas - New School Security: The Times Are A-Changin'

Interop Las Vegas - Social Engineering: The Bad, Better, and Best Incident Response Plans

BSides Canberra - Scrutiny on the Bounty

QCon London - Nihilist’s Guide to Wrecking Humans and Systems

(ISC)2 Phoenix - The Active Directory Kill Chain

ASU-Arkfeld eDiscovery and Digital Evidence Conference - HACKED! Not If, But When...

Bishop Fox Sponsors NorthSec 2016

Kiwicon 9 - The Nihilist’s Guide to Wrecking Humans and Systems

Cal Poly SWIFT - Bishop Fox Social Engineering Workshop

QCon San Francisco - Securing Code Through Social Engineering

ITAC 2015 – OWASP – Internet of Things (IoT) – Top 10 Vulnerabilities List

ITAC 2015 – CloudBots – Abusing Free Cloud Services to Build Botnets in the Cloud

ITAC 2015 – Putting Your Logs On a Diet – Network Intrusion Detection – Best Practices

Practising Law Institute - A Hacker's Perspective

Phoenix Security & Audit Conference 2015 - The Active Directory Kill Chain

DerbyCon 5.0 "Unity" - Bypass Surgery Abusing Content Delivery Networks

DEF CON 23 - RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID

Future Crimes

BSides LV 2015 - Insider Tricks for Bug Bounty Success

OWASP Atlanta - Social Engineering: Technical Controls for Emotionless Defense

Converge Detroit - Homebrew Censorship Detection by Analysis of BGP Data

BSidesPGH - Never Surrender: Reducing Social Engineering Risk

OWASP Phoenix - If You Like It, Then You Shouldn’t Put a Ring3 on It

Practising Law Institute - The Latest Developments in Cybersecurity Law

DEF CON 23 - Hacking Smart Safes: On the "Brink" of a Robbery

Black Hat USA 2015 - Bypass Surgery Abusing Content Delivery Networks

Interop Las Vegas - Where Are the Weakest Links in Cyber Security?

RSA 2015 – That Point of Sales Is a PoS

Atlanta Tech Village - Security Compensation - How to Invest In Startup Security

CactusCon – Wireless Network Risks and Controls

ISACA Phoenix – Wireless Network Risks and Controls

Seattle Security B-Sides – Shoulda, Woulda, Coulda

MIT Enterprise Forum Atlanta

Cal Poly SLO – So You Want to be a Hacker?

UAT - Lessons on Security Consulting: What I Have Learned Since Graduation

ISSA Tucson Chapter Meeting

ToorCon San Diego - If You Like It, Then You Shouldn't Put a Ring3 On It

GrrCON - Vulnerable By Design – The Backdoor That Came Through the Front

MISTI – ITAC 2014 – SCADA Hacking: Clear and Present Danger

Bishop Fox Sponsors BSides Portland

MISTI – ITAC 2014 – Mobile Application Security: Testing and Code Review

NYU Polytechnic School of Engineering - Career Discovery in Cyber Security: A Women's Symposium

OWASP - Testing Guide 4.0

Practising Law Institute – Cybersecurity 2014: Managing the Risk

44CON - Lessons Learned from Black Hat's Infrastructure: The Tweets Must Flow

IEEE Spectrum - Black Hat 2014: How to Hack the Cloud to Mine Crypto Currency

Gigaom - How Free Cloud Services Become Free, Currency-Mining, DDoS-Attacking Botnets

Bishop Fox to Demonstrate Three Innovative Tools at Black Hat Tools Arsenal

Bishop Fox to Present at Black Hat 2014 and Security B-Sides in Las Vegas

Black Hat USA 2014 Tools Arsenal – iSpy

Black Hat USA 2014 – The Future of Responsible Disclosure

Black Hat USA 2014 Tools Arsenal – Oops, I RFIDID It Again

CyberTech - Securing the Internet of Things Masters Panel

Black Hat USA 2014 Tools Arsenal – Rickrolling Your Neighbors With Google Chromecast

BsidesLV - Untwisting The Mersenne Twister: How I Killed The PRNG

Black Hat USA – CloudBots: Harvesting Crypto Coins like a Botnet Farmer

SyScan 360 – CloudBots: Harvesting Crypto Coins Like A Botnet Farmer

InfoSecurity - Is SSL Secure? Cutting Through The Paranoia

CactusCon - Python: Because Exploit Code Should Look Pretty

Dark Reading - Understanding And Prioritizing Today’s Threats

CactusCon - Malware and the Syrian Civil War

ISACA Phoenix - Protection of Information Assets

RSA – Cloud Ninja: Catch Me If You Can!

Greater Phoenix Economic Council – Ambassador Event: Cyber Security Panel Discussion

MISTI - ITAC 2013 - Wireless Network Risks and Controls

MISTI - Mobile and Smart Device Security 2013

Root The Box

ToorCon San Diego - I Can Have DarkNet & MeshNet Best Practices?

ToorCon San Diego - Rickrolling Your Neighbors With Google Chromecast

CyberFest 2013 - Practical Mobile Security: Security For The Rest Of Us

Bsides PDX - Resistance Networks - Sept2013

DEF CON 21: Francis Brown Presenting RFID Hacking: Live Free Or RFID Hard

Black Hat USA 2013: Francis Brown Presenting RFID Hacking: Live Free Or RFID Hard

Black Hat USA 2013: Drew Porter & Stephen Smith Presenting Let’s Get Physical: Breaking Home Security Systems and Bypassing Buildings Controls

SIM AZ Chapter Meeting: Drew Porter & Andrew Wilson presenting on latest IT security trends - 15May2013

ISSA Seattle – Birgit Mullen Presenting Spring Cleaning for Active Directory

InfoSec World 2013 – Francis Brown Presenting Using Google to Find Vulnerabilities in Your IT Environment

Cactus Con – Joe DeMesy Presenting Fire and Forget Password Cracking

RSA 2013 – Speaker Panel - Does Security Awareness Training Actually Improve Enterprise Security?

Point2Security - A Primer for Securing the Startup

BayThreat 2012 - Where to Start When Securing a Startup? - Dec2012

Tenacious Diggity - ITAC 2012 - Nov 2012

Tenacious Diggity - Hacker Halted USA 2012 - Oct 2012

Hacker Halted USA 2012 - Speaker Panel- How to Make End Users Smarter About Security - 29Oct2012

Security B-Sides ATL – Oct. 2012 – Rob & Oscar Hack Fu

2012 Cyber Security Awareness Day at KSU - Attack Chaining

IEEE International Requirements Engineering Conference 2012 - Writing Security Objectives - 25Sept2012

ISSA/ISACA - 2012 Phoenix Summer Security & Audit Conference - Tenacious Diggity

Tenacious Diggity - DEF CON 20 - July 2012

Tenacious Diggity - Black Hat USA 2012 - Arsenal - July 2012

OWASP Atlanta - Attack Chaining Advanced Maneuvers

Pulp Google Hacking - ISSA Tucson - May2012

ISSA Los Angeles - Fourth Annual Information Security Summit - May2012

Inaugural Security Development Conference - Speaker Panel - SDL and Regulatory Compliance - 15May2012

TakeDownCon Dallas 2012 - Pulp Google Hacking - 08May2012

IT Partners Event - BYOD and Mobile Security Issues - 04May2012

Pulp Google Hacking - Arizona Strategic Enterprise Technology (ASET) - 02May2012

InfoSec World 2012 - Pulp Google Hacking – The Next Generation Search Engine Hacking Arsenal

SharePoint Hacking Diggity Project - OWASP L.A.

Pulp Google Hacking - ISSA L.A.

Putting Your Logs on a Diet - BayThreat 2011

Pulp Google Hacking - BayThreat 2011

Pulp Google Hacking - UAT Tech Forum - Nov2011

Pulp Google Hacking - Hacker Halted USA 2011

Pulp Google Hacking - Kennesaw State University - Oct2011

Pulp Google Hacking - OWASP Boston - Oct2011

Pulp Google Hacking - OWASP Philadelphia - Oct2011

Pulp Google Hacking - Black Hat USA 2011

Bishop Fox Partner Christie Terrill to Present Dark Reading Keynote

ToorCon Seattle 2011 - Turning the World Upside DownThreat Modeling a Constitution

TakeDownCon 2011 - Lord of the Bing - 18May2011

InfoSec World 2011 - Google Hacking: To Infinity and Beyond – A Tool Story

ISSA Phoenix - Lord of the Bing - April 2011

HackCon 2011

OWASP Phoenix - SharePoint Hacking - Feb 2011

Hacker Halted 2010

ToorCon 12 - Lord of the Bing

Security B-Sides Atlanta 2010

ISSA Phoenix - SharePoint Security - Advanced SharePoint Security Tips and Tools - Oct 2010

DEF CON 18 (2010) - Lord of the Bing: Taking back search engine hacking from Google and Bing

Black Hat USA 2010 - Lord of the Bing: Taking back search engine hacking from Google and Bing

HP Technology Forum 2010 - Practical Enterprise Web Application Security

SANS Pen Testing Summit 2010 - The Good, The Bad, and the Ridiculous in Pen Testing - 14Jun2010

OWASP Boston - Data Exposure, New Approaches to OSINT - 03May2010

InfoSec World 2010 - Google and Beyond: Advanced Search Engine Hacking and Web Based Intelligence Gathering

2010 FAA IT/ISS Partnership and Training Conference

SANS App Sec Summit 2010

HP Software Universe 2009

SANS What Works in Penetration Testing & Web Application Attacks 2009

Do More with Less

Do More with Less - with HP

SANS - What Works Poster (Fall 2008) - Stach & Liu listed as a trusted vendor solution for Application Penetration Testing

Microsoft Bluehat v8 - Real World Code Review - Using the Right Tools in the Right Place at the Right Time - 16Oct2008

HP Software Universe 2008

SANS What Works in Web Application Security Summit 2008

SANS What Works in Penetration Testing & Ethical Hacking Summit 2008

SPICON 2007 - Lessons Learned - Implementing an Application Security Program

SANS What Works in Application Security Summit 2007

OWASP San Francisco Chapter Meeting

OWASP Phoenix - Protecting Web Applications Throughout the Development Lifecycle - Jan 2007

OWASP Phoenix - Application Security Vulnerabilities in Publicly Available Source Code - Nov 2006

SPICON 2006 - Industry Experts Panel for Application Security

Arizona High Technology Crime Investigation Association - Anti-Forensics

Computer and Enterprise Investigations Conference 2006 - Defeating Forensic Analysis

InfoSecWorld 2006 - Bleeding-Edge Anti-Forensics

Microsoft BlueHat v2 - The Metasploit Anti-Forensics Project

ToorCon 7 - The Metasploit Anti-Forensics Project

Black Hat USA 2005 - Catch Me If You Can: Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch…

Need a Cybersecurity Expert to Speak at Your Event?

Please get in touch with our Speaker Bureau program manager, Virginie Jenck. Please email her at contact@bishopfox.com

More...

More...

Subscribe to Updates