Bishop Fox Will be Everywhere at CactusCon 2019!

ASU DevilSec Meeting

Bishop Fox is Coming to Day of Shecurity San Francisco

Kaitlin O'Neil and Kelly Albrink to Sit on Panel at Day of Shecurity San Francisco

Kate Broussard to Present at Day of Shecurity San Francisco

Kate Broussard to Present at Day of Shecurity Toronto

RedSec Atlanta 2: Sipping & Security

DEF CON 27 (Demo Lab) - Zigbee Hacking: Smarter Home Invasion with ZigDiggity

DEF CON 27 - SpellCheck: The Hacker Spelling Bee

BSides Las Vegas 2019 - Reverse Engineering Mobile Apps: Never Pay for Transit Again

Black Hat USA Arsenal 2019 - Eyeballer: Weaponized Machine Learning to Target Website Screenshots

DEF CON 27 - Finding Secrets In Publicly Exposed EBS Volumes

Black Hat USA 2019 Arsenal - Smarter Home Invasion with ZigDiggity

SummerCon 2019 - Sliver

Cybersecurity Council of Arizona – Cybersecurity Career Conversations

The Diana Initiative - Step 2: Editing, Step 3: Profit

RedSec of Atlanta - Hacking & Hobnobbing

CircleCityCon 6.0 - What the Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing

CircleCityCon 6.0 - Cuckoo Sandbox Setup: Malware Detection Through Detonation

Bishop Fox Sponsors Summercon 2019

THOTCON - What the Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing

DC480 - Cuckoo Sandbox Setup: Malware Detection Through Detonation

Dictionary Society of N. America - How I Compiled a Cybersecurity Style Guide

STE - How the Media Industry Can Achieve Security Success

Kaspersky SAS - Ghost in the Browser: Broad-Scale Espionage with Bitsquatting

SqR00t - Twist & Shout: Ferris Bueller’s Guide to Abuse Domain Permutations

WiCyS 2019 - Red Team Your Resume: Insiders Share Secrets

BSides San Francisco - Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations

University of Advancing Technology - Breaking Into a Career of Breaking In

BSides Columbus 2019 - Check Your Privilege (Escalation)

WOPR Summit - Ham Hacks: Breaking Into Software Defined Radio

Bishop Fox to Speak at BSidesSF 2019

Day of Shecurity - The Path to Security Has Many Branches

Bishop Fox - Live at Day of Shecurity!

Day of Shecurity - Network Pen Testing Tool Kit: Nmap, Netcat, and Metasploit Basics

Day of Shecurity - Introduction to Linux Privilege Escalation Methods

Art Into Science - Pose a Threat: How Perceptual Analysis Helps Bug Hunters

OWASP - AppSec California 2019 - Pose a Threat: How Perceptual Analysis Helps Bug Hunters

NBT5: HackerFight - Traditional Penetration Testing vs Continuous Security & Red Teaming

PCI Conference - The Latest Laws and a Hacker's Perspective

RiskRecon - Third-Party Security Risk Management Practices Roundtable

Practising Law Institute SFO - Cybersecurity: A Hacker's Perspective

Women in Security & Privacy - Network Penetration Test Workshop

Practising Law Institute - Cybersecurity 2018: Managing Cybersecurity Incidents

2018 Cybersecurity Symposium - Breaking Into a Career of Breaking In

University of Advancing Technology - How To Get A Job Panel

University of Advancing Technology - BLTs with Bishop Fox

Bishop Fox Sponsors CactusCon 2018

Practising Law Institute NYC - Cybersecurity: A Hacker's Perspective

CactusCon 2018 - Anatomy of an AppSec Program

Rocky Mountain Safety Conference: Understanding & Responding to Cybersecurity Risks

DEF CON 26 - SpellCheck: The Hacker Spelling Bee

Black Hat USA 2018 Arsenal - Zigdiggity: Zigbee Pentest Toolkit

The Circle of HOPE - SpellCheck: The Hacker Spelling Bee

Cyber Security Summit 2018 - Hackers and Threats

(ISC)2 Phoenix - Effectively Operating a Bug Bounty Program

(ISC)2 Phoenix - Developing and Testing an Effective Incident Response Program

Bishop Fox Sponsors Summercon 2018

Day of Shecurity - Network Penetration Testing Toolkit: Netcat, Nmap, and Metasploit Basics

Chicago Manual of Style Event - Brianne Hughes Talks About The Cybersecurity Style Guide

Empire Hacking NYC Meetup - Server-side Spreadsheet Injections in High Impact Attacks

Estrella Mountain Community College/Mosaic451 - A Cyber Security Round Table

Data Science Meetup - Game Over, Man! Reversing Video Games to Create an Unbeatable AI Player

WiCyS 2018 - Build Me a World Class Security Program in Three Months

Bishop Fox Sponsors WiCyS 2018

Okta Rex Talks - Better Red Than Dead: Elegant Weapons for a More Civilized Age

Kaspersky SAS - 9Tail: Proactive Security Assessment

SOURCE Mesa - Security Needs a Style Guide and Here's V1

2018 Renewable Energy Law Conference - Gamification of Incident Response

O'Reilly Security Podcast - Christie Terrill

SANS Core NetWars Tournament of Champions

O'Reilly Security Conference - Build Me a World Class Security Program in Three Months

DeadDrop SF Meetup - Better Red Than Dead: Elegant Weapons For A More Civilized Age

CactusCon - Red Team Your Resume: Tips From An Insider

CactusCon - Chaos in the Machine: Why Security Needs a Style Guide

Smash the Record 2017 - SmashBot vs. The Baddies

Practising Law Institute – Cybersecurity: A Hacker’s Perspective

(ISC)2 Phoenix – Let's Play a Game: Why Incident Response Matters

Bishop Fox Introduces Hacking AI "DeepHack" at DEF CON 25

DEF CON 25 - Game of Drones: Putting the Emerging 'Drone Defense' Market to the Test

DEF CON 25 - Weaponizing Machine Learning: Humanity Was Overrated Anyway

Bishop Fox Sponsors SummerCon 2017

Black Hat USA 2017 Arsenal Theater Demo - Game of Drones

Interop ITX - Developing and Testing an Effective Incident Response Program

Bishop Fox to Speak at Interop

Estrella Mountain Community College - Breaking Into Cybersecurity

The Hacking Club at SFSU - All About Infosec

Bishop Fox to Present "Highway to the Danger Drone"

Women in Cybersecurity Conference 2017 - Cybersecurity Incident Response Panel

ISSA Phoenix - There and Back Again: A Security Consultant's Tale

Bishop Fox Partner Christie Terrill to Present at Dark Reading Webinar and Conference

Interop ITX - Defeating Social Engineering, BECs & Phishing

QCon London - Continuous Dis-Integration: Red Team Attacks

QCon London - Out of the Browser Into the Fire

Bishop Fox Sponsors MITCTF 2017

82nd Annual Kentucky Society of Professional Engineers Convention - Highway to the Danger Drone

Bishop Fox to Discuss How to Create a Security Blueprint Using the CIS 20 at Cloud IT Live

2016 Kennesaw State’s Cyber Security Awareness Day – Exploiting Smart Devices

DerbyCon 6.0 - SmashBot Shoutout in Keynote

Practising Law Institute - Cybersecurity: A Hacker's Perspective

Dragon Con - Women in Science and Tech Careers

Dragon Con - Hacking 101

DEF CON 24 - Game Over, Man! - Reversing Video Games to Create an Unbeatable AI Player

Bishop Fox to Speak at Black Hat and DEF CON 2016

Black Hat USA 2016 Arsenal - Highway to the Danger Drone

Black Hat USA 2016 - Highway to the Danger Drone - Arsenal Theater Demo

Arizona Technology Council 2016 Cybersecurity Summit - Internet of Things Panel

CactusCon - Developing and Testing an Effective Incident Response Program

CactusCon - Telling Lies & Making Friends: Penetrating People's Emotional Barriers

SANS Internet Storm Center - ISC StormCast for Sunday, April 10th 2016

The Hacking Club at SFSU - Ethical Hacker Career Day

Bishop Fox Sponsors CactusCon 2016

Interop Las Vegas - New School Security: The Times Are A-Changin'

Interop Las Vegas - Social Engineering: The Bad, Better, and Best Incident Response Plans

BSides Canberra - Scrutiny on the Bounty

QCon London - Nihilist’s Guide to Wrecking Humans and Systems

(ISC)2 Phoenix - The Active Directory Kill Chain

ASU-Arkfeld eDiscovery and Digital Evidence Conference - HACKED! Not If, But When...

Bishop Fox Sponsors NorthSec 2016

Kiwicon 9 - The Nihilist’s Guide to Wrecking Humans and Systems

Cal Poly SWIFT - Bishop Fox Social Engineering Workshop

QCon San Francisco - Securing Code Through Social Engineering

ITAC 2015 – OWASP – Internet of Things (IoT) – Top 10 Vulnerabilities List

ITAC 2015 – CloudBots – Abusing Free Cloud Services to Build Botnets in the Cloud

ITAC 2015 – Putting Your Logs On a Diet – Network Intrusion Detection – Best Practices

Practising Law Institute - A Hacker's Perspective

Phoenix Security & Audit Conference 2015 - The Active Directory Kill Chain

DerbyCon 5.0 "Unity" - Bypass Surgery Abusing Content Delivery Networks

DEF CON 23 - RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID

Future Crimes

BSides LV 2015 - Insider Tricks for Bug Bounty Success

OWASP Atlanta - Social Engineering: Technical Controls for Emotionless Defense

Converge Detroit - Homebrew Censorship Detection by Analysis of BGP Data

BSidesPGH - Never Surrender: Reducing Social Engineering Risk

OWASP Phoenix - If You Like It, Then You Shouldn’t Put a Ring3 on It

Practising Law Institute - The Latest Developments in Cybersecurity Law

DEF CON 23 - Hacking Smart Safes: On the "Brink" of a Robbery

Black Hat USA 2015 - Bypass Surgery Abusing Content Delivery Networks

Interop Las Vegas - Where Are the Weakest Links in Cyber Security?

RSA 2015 – That Point of Sales Is a PoS

Atlanta Tech Village - Security Compensation - How to Invest In Startup Security

CactusCon – Wireless Network Risks and Controls

ISACA Phoenix – Wireless Network Risks and Controls

Seattle Security B-Sides – Shoulda, Woulda, Coulda

MIT Enterprise Forum Atlanta

Cal Poly SLO – So You Want to be a Hacker?

UAT - Lessons on Security Consulting: What I Have Learned Since Graduation

ISSA Tucson Chapter Meeting

ToorCon San Diego - If You Like It, Then You Shouldn't Put a Ring3 On It

GrrCON - Vulnerable By Design – The Backdoor That Came Through the Front

MISTI – ITAC 2014 – SCADA Hacking: Clear and Present Danger

Bishop Fox Sponsors BSides Portland

MISTI – ITAC 2014 – Mobile Application Security: Testing and Code Review

NYU Polytechnic School of Engineering - Career Discovery in Cyber Security: A Women's Symposium

OWASP - Testing Guide 4.0

Practising Law Institute – Cybersecurity 2014: Managing the Risk

44CON - Lessons Learned from Black Hat's Infrastructure: The Tweets Must Flow

IEEE Spectrum - Black Hat 2014: How to Hack the Cloud to Mine Crypto Currency

Gigaom - How Free Cloud Services Become Free, Currency-Mining, DDoS-Attacking Botnets

Bishop Fox to Demonstrate Three Innovative Tools at Black Hat Tools Arsenal

Bishop Fox to Present at Black Hat 2014 and Security B-Sides in Las Vegas

Black Hat USA 2014 Tools Arsenal – iSpy

Black Hat USA 2014 – The Future of Responsible Disclosure

Black Hat USA 2014 Tools Arsenal – Oops, I RFIDID It Again

CyberTech - Securing the Internet of Things Masters Panel

Black Hat USA 2014 Tools Arsenal – Rickrolling Your Neighbors With Google Chromecast

BsidesLV - Untwisting The Mersenne Twister: How I Killed The PRNG

Black Hat USA – CloudBots: Harvesting Crypto Coins like a Botnet Farmer

SyScan 360 – CloudBots: Harvesting Crypto Coins Like A Botnet Farmer

InfoSecurity - Is SSL Secure? Cutting Through The Paranoia

CactusCon - Python: Because Exploit Code Should Look Pretty

Dark Reading - Understanding And Prioritizing Today’s Threats

CactusCon - Malware and the Syrian Civil War

ISACA Phoenix - Protection of Information Assets

RSA – Cloud Ninja: Catch Me If You Can!

Greater Phoenix Economic Council – Ambassador Event: Cyber Security Panel Discussion

MISTI - ITAC 2013 - Wireless Network Risks and Controls

MISTI - Mobile and Smart Device Security 2013

Root The Box

ToorCon San Diego - I Can Have DarkNet & MeshNet Best Practices?

ToorCon San Diego - Rickrolling Your Neighbors With Google Chromecast

CyberFest 2013 - Practical Mobile Security: Security For The Rest Of Us

Bsides PDX - Resistance Networks - Sept2013

DEF CON 21: Francis Brown Presenting RFID Hacking: Live Free Or RFID Hard

Black Hat USA 2013: Francis Brown Presenting RFID Hacking: Live Free Or RFID Hard

Black Hat USA 2013: Drew Porter & Stephen Smith Presenting Let’s Get Physical: Breaking Home Security Systems and Bypassing Buildings Controls

SIM AZ Chapter Meeting: Drew Porter & Andrew Wilson presenting on latest IT security trends - 15May2013

ISSA Seattle – Birgit Mullen Presenting Spring Cleaning for Active Directory

InfoSec World 2013 – Francis Brown Presenting Using Google to Find Vulnerabilities in Your IT Environment

Cactus Con – Joe DeMesy Presenting Fire and Forget Password Cracking

RSA 2013 – Speaker Panel - Does Security Awareness Training Actually Improve Enterprise Security?

Point2Security - A Primer for Securing the Startup

BayThreat 2012 - Where to Start When Securing a Startup? - Dec2012

Tenacious Diggity - ITAC 2012 - Nov 2012

Tenacious Diggity - Hacker Halted USA 2012 - Oct 2012

Hacker Halted USA 2012 - Speaker Panel- How to Make End Users Smarter About Security - 29Oct2012

Security B-Sides ATL – Oct. 2012 – Rob & Oscar Hack Fu

2012 Cyber Security Awareness Day at KSU - Attack Chaining

IEEE International Requirements Engineering Conference 2012 - Writing Security Objectives - 25Sept2012

ISSA/ISACA - 2012 Phoenix Summer Security & Audit Conference - Tenacious Diggity

Tenacious Diggity - DEF CON 20 - July 2012

Tenacious Diggity - Black Hat USA 2012 - Arsenal - July 2012

OWASP Atlanta - Attack Chaining Advanced Maneuvers

Pulp Google Hacking - ISSA Tucson - May2012

ISSA Los Angeles - Fourth Annual Information Security Summit - May2012

Inaugural Security Development Conference - Speaker Panel - SDL and Regulatory Compliance - 15May2012

TakeDownCon Dallas 2012 - Pulp Google Hacking - 08May2012

IT Partners Event - BYOD and Mobile Security Issues - 04May2012

Pulp Google Hacking - Arizona Strategic Enterprise Technology (ASET) - 02May2012

InfoSec World 2012 - Pulp Google Hacking – The Next Generation Search Engine Hacking Arsenal

SharePoint Hacking Diggity Project - OWASP L.A.

Pulp Google Hacking - ISSA L.A.

Putting Your Logs on a Diet - BayThreat 2011

Pulp Google Hacking - BayThreat 2011

Pulp Google Hacking - UAT Tech Forum - Nov2011

Pulp Google Hacking - Hacker Halted USA 2011

Pulp Google Hacking - Kennesaw State University - Oct2011

Pulp Google Hacking - OWASP Boston - Oct2011

Pulp Google Hacking - OWASP Philadelphia - Oct2011

Pulp Google Hacking - Black Hat USA 2011

Bishop Fox Partner Christie Terrill to Present Dark Reading Keynote

ToorCon Seattle 2011 - Turning the World Upside DownThreat Modeling a Constitution

TakeDownCon 2011 - Lord of the Bing - 18May2011

InfoSec World 2011 - Google Hacking: To Infinity and Beyond – A Tool Story

ISSA Phoenix - Lord of the Bing - April 2011

HackCon 2011

OWASP Phoenix - SharePoint Hacking - Feb 2011

Hacker Halted 2010

ToorCon 12 - Lord of the Bing

Security B-Sides Atlanta 2010

ISSA Phoenix - SharePoint Security - Advanced SharePoint Security Tips and Tools - Oct 2010

DEF CON 18 (2010) - Lord of the Bing: Taking back search engine hacking from Google and Bing

Black Hat USA 2010 - Lord of the Bing: Taking back search engine hacking from Google and Bing

HP Technology Forum 2010 - Practical Enterprise Web Application Security

SANS Pen Testing Summit 2010 - The Good, The Bad, and the Ridiculous in Pen Testing - 14Jun2010

OWASP Boston - Data Exposure, New Approaches to OSINT - 03May2010

InfoSec World 2010 - Google and Beyond: Advanced Search Engine Hacking and Web Based Intelligence Gathering

2010 FAA IT/ISS Partnership and Training Conference

SANS App Sec Summit 2010

HP Software Universe 2009

SANS What Works in Penetration Testing & Web Application Attacks 2009

Do More with Less

Do More with Less - with HP

SANS - What Works Poster (Fall 2008) - Stach & Liu listed as a trusted vendor solution for Application Penetration Testing

Microsoft Bluehat v8 - Real World Code Review - Using the Right Tools in the Right Place at the Right Time - 16Oct2008

HP Software Universe 2008

SANS What Works in Web Application Security Summit 2008

SANS What Works in Penetration Testing & Ethical Hacking Summit 2008

SPICON 2007 - Lessons Learned - Implementing an Application Security Program

SANS What Works in Application Security Summit 2007

OWASP San Francisco Chapter Meeting

OWASP Phoenix - Protecting Web Applications Throughout the Development Lifecycle - Jan 2007

OWASP Phoenix - Application Security Vulnerabilities in Publicly Available Source Code - Nov 2006

SPICON 2006 - Industry Experts Panel for Application Security

Arizona High Technology Crime Investigation Association - Anti-Forensics

Computer and Enterprise Investigations Conference 2006 - Defeating Forensic Analysis

InfoSecWorld 2006 - Bleeding-Edge Anti-Forensics

Microsoft BlueHat v2 - The Metasploit Anti-Forensics Project

ToorCon 7 - The Metasploit Anti-Forensics Project

Black Hat USA 2005 - Catch Me If You Can: Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch…

Need a Cybersecurity Expert to Speak at Your Event?

Please get in touch with our Speaker Bureau program manager, Virginie Jenck. Please email her at contact@bishopfox.com

More...

Subscribe to Updates