Mo Hijazi to Present Trust Through Verification

Webinar: Tackling the Changed Landscape of Enterprise Security – An Industry Roundtable

Christie Terrill to Present for NJ Cyber Threat Intelligence & Security Operations Group

Ankur Chowdhary to Present at DEF CON 28 Red Team Village

Rob Ragan to Present at Global AppSec San Francisco 2020

Rob Ragan to Present at Black Hat 2020

Priyank Nigam to Present at Denver ISSA Virtual Chapter Meeting

Barrett Darnell, Kelly Albrink and Caleb Gross to Present at DERPCON Virtual Conference

Bishop Fox Sponsors BSides Atlanta

Rhett Greenhagen and Rob Ragan to Give Opening Keynote Presentation at CanSecWest

Joe DeMesy and Dan Petro to Present at Pycon

Rhett Greenhagen To Deliver Keynote at BSides Tampa

Mike Ostrowski to Speak at ASU DevilSec

Barrett Darnell to Present at SnowFROC

Rob Ragan and Oscar Salazar Present at ACoD 2020

Brianne Hughes to Present at BSides San Francisco

Rob Ragan and Gwen Castro to Sit on Panels at IG3 West

Bishop Fox Will be Everywhere at CactusCon 2019!

Rhett Greenhagen to Present at ACoD 2020

ASU DevilSec Meeting

Bishop Fox is Coming to Day of Shecurity San Francisco

Kaitlin O'Neil and Kelly Albrink to Sit on Panel at Day of Shecurity San Francisco

Kate Broussard to Present at Day of Shecurity San Francisco

Kate Broussard to Present at Day of Shecurity Toronto

RedSec Atlanta 2: Sipping & Security

DEF CON 27 (Demo Lab) - Zigbee Hacking: Smarter Home Invasion with ZigDiggity

DEF CON 27 - SpellCheck: The Hacker Spelling Bee

BSides Las Vegas 2019 - Reverse Engineering Mobile Apps: Never Pay for Transit Again

Black Hat USA Arsenal 2019 - Eyeballer: Weaponized Machine Learning to Target Website Screenshots

DEF CON 27 - Finding Secrets In Publicly Exposed EBS Volumes

Black Hat USA 2019 Arsenal - Smarter Home Invasion with ZigDiggity

SummerCon 2019 - Sliver

Cybersecurity Council of Arizona – Cybersecurity Career Conversations

The Diana Initiative - Step 2: Editing, Step 3: Profit

RedSec of Atlanta - Hacking & Hobnobbing

CircleCityCon 6.0 - What the Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing

CircleCityCon 6.0 - Cuckoo Sandbox Setup: Malware Detection Through Detonation

Bishop Fox Sponsors Summercon 2019

THOTCON - What the Frida Gave Me: A Novel Take on E-Ticket Forging and E-Ticket Stealing

DC480 - Cuckoo Sandbox Setup: Malware Detection Through Detonation

Dictionary Society of N. America - How I Compiled a Cybersecurity Style Guide

STE - How the Media Industry Can Achieve Security Success

Kaspersky SAS - Ghost in the Browser: Broad-Scale Espionage with Bitsquatting

SqR00t - Twist & Shout: Ferris Bueller’s Guide to Abuse Domain Permutations

WiCyS 2019 - Red Team Your Resume: Insiders Share Secrets

BSides San Francisco - Twist & Shout: Ferris Bueller's Guide to Abuse Domain Permutations

University of Advancing Technology - Breaking Into a Career of Breaking In

BSides Columbus 2019 - Check Your Privilege (Escalation)

WOPR Summit - Ham Hacks: Breaking Into Software Defined Radio

Bishop Fox to Speak at BSidesSF 2019

Day of Shecurity - The Path to Security Has Many Branches

Bishop Fox - Live at Day of Shecurity!

Day of Shecurity - Network Pen Testing Tool Kit: Nmap, Netcat, and Metasploit Basics

Day of Shecurity - Introduction to Linux Privilege Escalation Methods

Art Into Science - Pose a Threat: How Perceptual Analysis Helps Bug Hunters

OWASP - AppSec California 2019 - Pose a Threat: How Perceptual Analysis Helps Bug Hunters

NBT5: HackerFight - Traditional Penetration Testing vs Continuous Security & Red Teaming

PCI Conference - The Latest Laws and a Hacker's Perspective

RiskRecon - Third-Party Security Risk Management Practices Roundtable

Practising Law Institute SFO - Cybersecurity: A Hacker's Perspective

Women in Security & Privacy - Network Penetration Test Workshop

Practising Law Institute - Cybersecurity 2018: Managing Cybersecurity Incidents

2018 Cybersecurity Symposium - Breaking Into a Career of Breaking In

University of Advancing Technology - How To Get A Job Panel

University of Advancing Technology - BLTs with Bishop Fox

Bishop Fox Sponsors CactusCon 2018

Practising Law Institute NYC - Cybersecurity: A Hacker's Perspective

CactusCon 2018 - Anatomy of an AppSec Program

Rocky Mountain Safety Conference: Understanding & Responding to Cybersecurity Risks

DEF CON 26 - SpellCheck: The Hacker Spelling Bee

Black Hat USA 2018 Arsenal - Zigdiggity: Zigbee Pentest Toolkit

The Circle of HOPE - SpellCheck: The Hacker Spelling Bee

Cyber Security Summit 2018 - Hackers and Threats

(ISC)2 Phoenix - Effectively Operating a Bug Bounty Program

(ISC)2 Phoenix - Developing and Testing an Effective Incident Response Program

Bishop Fox Sponsors Summercon 2018

Day of Shecurity - Network Penetration Testing Toolkit: Netcat, Nmap, and Metasploit Basics

Chicago Manual of Style Event - Brianne Hughes Talks About The Cybersecurity Style Guide

Empire Hacking NYC Meetup - Server-side Spreadsheet Injections in High Impact Attacks

Estrella Mountain Community College/Mosaic451 - A Cyber Security Round Table

Data Science Meetup - Game Over, Man! Reversing Video Games to Create an Unbeatable AI Player

WiCyS 2018 - Build Me a World Class Security Program in Three Months

Bishop Fox Sponsors WiCyS 2018

Okta Rex Talks - Better Red Than Dead: Elegant Weapons for a More Civilized Age

Kaspersky SAS - 9Tail: Proactive Security Assessment

SOURCE Mesa - Security Needs a Style Guide and Here's V1

2018 Renewable Energy Law Conference - Gamification of Incident Response

O'Reilly Security Podcast - Christie Terrill

SANS Core NetWars Tournament of Champions

O'Reilly Security Conference - Build Me a World Class Security Program in Three Months

DeadDrop SF Meetup - Better Red Than Dead: Elegant Weapons For A More Civilized Age

CactusCon - Red Team Your Resume: Tips From An Insider

CactusCon - Chaos in the Machine: Why Security Needs a Style Guide

Smash the Record 2017 - SmashBot vs. The Baddies

Practising Law Institute – Cybersecurity: A Hacker’s Perspective

(ISC)2 Phoenix – Let's Play a Game: Why Incident Response Matters

Bishop Fox Introduces Hacking AI "DeepHack" at DEF CON 25

DEF CON 25 - Game of Drones: Putting the Emerging 'Drone Defense' Market to the Test

DEF CON 25 - Weaponizing Machine Learning: Humanity Was Overrated Anyway

Bishop Fox Sponsors SummerCon 2017

Black Hat USA 2017 Arsenal Theater Demo - Game of Drones

Interop ITX - Developing and Testing an Effective Incident Response Program

Bishop Fox to Speak at Interop

Estrella Mountain Community College - Breaking Into Cybersecurity

The Hacking Club at SFSU - All About Infosec

Bishop Fox to Present "Highway to the Danger Drone"

Women in Cybersecurity Conference 2017 - Cybersecurity Incident Response Panel

ISSA Phoenix - There and Back Again: A Security Consultant's Tale

Bishop Fox Partner Christie Terrill to Present at Dark Reading Webinar and Conference

Interop ITX - Defeating Social Engineering, BECs & Phishing

QCon London - Continuous Dis-Integration: Red Team Attacks

QCon London - Out of the Browser Into the Fire

Bishop Fox Sponsors MITCTF 2017

82nd Annual Kentucky Society of Professional Engineers Convention - Highway to the Danger Drone

Bishop Fox to Discuss How to Create a Security Blueprint Using the CIS 20 at Cloud IT Live

2016 Kennesaw State’s Cyber Security Awareness Day – Exploiting Smart Devices

DerbyCon 6.0 - SmashBot Shoutout in Keynote

Practising Law Institute - Cybersecurity: A Hacker's Perspective

Dragon Con - Women in Science and Tech Careers

Dragon Con - Hacking 101

DEF CON 24 - Game Over, Man! - Reversing Video Games to Create an Unbeatable AI Player

Bishop Fox to Speak at Black Hat and DEF CON 2016

Black Hat USA 2016 Arsenal - Highway to the Danger Drone

Black Hat USA 2016 - Highway to the Danger Drone - Arsenal Theater Demo

Arizona Technology Council 2016 Cybersecurity Summit - Internet of Things Panel

CactusCon - Developing and Testing an Effective Incident Response Program

CactusCon - Telling Lies & Making Friends: Penetrating People's Emotional Barriers

SANS Internet Storm Center - ISC StormCast for Sunday, April 10th 2016

The Hacking Club at SFSU - Ethical Hacker Career Day

Bishop Fox Sponsors CactusCon 2016

Interop Las Vegas - New School Security: The Times Are A-Changin'

Interop Las Vegas - Social Engineering: The Bad, Better, and Best Incident Response Plans

BSides Canberra - Scrutiny on the Bounty

QCon London - Nihilist’s Guide to Wrecking Humans and Systems

(ISC)2 Phoenix - The Active Directory Kill Chain

ASU-Arkfeld eDiscovery and Digital Evidence Conference - HACKED! Not If, But When...

Bishop Fox Sponsors NorthSec 2016

Kiwicon 9 - The Nihilist’s Guide to Wrecking Humans and Systems

Cal Poly SWIFT - Bishop Fox Social Engineering Workshop

QCon San Francisco - Securing Code Through Social Engineering

ITAC 2015 – OWASP – Internet of Things (IoT) – Top 10 Vulnerabilities List

ITAC 2015 – CloudBots – Abusing Free Cloud Services to Build Botnets in the Cloud

ITAC 2015 – Putting Your Logs On a Diet – Network Intrusion Detection – Best Practices

Practising Law Institute - A Hacker's Perspective

Phoenix Security & Audit Conference 2015 - The Active Directory Kill Chain

DerbyCon 5.0 "Unity" - Bypass Surgery Abusing Content Delivery Networks

DEF CON 23 - RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID

Future Crimes

BSides LV 2015 - Insider Tricks for Bug Bounty Success

OWASP Atlanta - Social Engineering: Technical Controls for Emotionless Defense

Converge Detroit - Homebrew Censorship Detection by Analysis of BGP Data

BSidesPGH - Never Surrender: Reducing Social Engineering Risk

OWASP Phoenix - If You Like It, Then You Shouldn’t Put a Ring3 on It

Practising Law Institute - The Latest Developments in Cybersecurity Law

DEF CON 23 - Hacking Smart Safes: On the "Brink" of a Robbery

Black Hat USA 2015 - Bypass Surgery Abusing Content Delivery Networks

Interop Las Vegas - Where Are the Weakest Links in Cyber Security?

RSA 2015 – That Point of Sales Is a PoS

Atlanta Tech Village - Security Compensation - How to Invest In Startup Security

CactusCon – Wireless Network Risks and Controls

ISACA Phoenix – Wireless Network Risks and Controls

Seattle Security B-Sides – Shoulda, Woulda, Coulda

MIT Enterprise Forum Atlanta

Cal Poly SLO – So You Want to be a Hacker?

UAT - Lessons on Security Consulting: What I Have Learned Since Graduation

ISSA Tucson Chapter Meeting

ToorCon San Diego - If You Like It, Then You Shouldn't Put a Ring3 On It

GrrCON - Vulnerable By Design – The Backdoor That Came Through the Front

MISTI – ITAC 2014 – SCADA Hacking: Clear and Present Danger

Bishop Fox Sponsors BSides Portland

MISTI – ITAC 2014 – Mobile Application Security: Testing and Code Review

NYU Polytechnic School of Engineering - Career Discovery in Cyber Security: A Women's Symposium

OWASP - Testing Guide 4.0

Practising Law Institute – Cybersecurity 2014: Managing the Risk

44CON - Lessons Learned from Black Hat's Infrastructure: The Tweets Must Flow

IEEE Spectrum - Black Hat 2014: How to Hack the Cloud to Mine Crypto Currency

Gigaom - How Free Cloud Services Become Free, Currency-Mining, DDoS-Attacking Botnets

Bishop Fox to Demonstrate Three Innovative Tools at Black Hat Tools Arsenal

Bishop Fox to Present at Black Hat 2014 and Security B-Sides in Las Vegas

Black Hat USA 2014 Tools Arsenal – iSpy

Black Hat USA 2014 – The Future of Responsible Disclosure

Black Hat USA 2014 Tools Arsenal – Oops, I RFIDID It Again

CyberTech - Securing the Internet of Things Masters Panel

Black Hat USA 2014 Tools Arsenal – Rickrolling Your Neighbors With Google Chromecast

BsidesLV - Untwisting The Mersenne Twister: How I Killed The PRNG

Black Hat USA – CloudBots: Harvesting Crypto Coins like a Botnet Farmer

SyScan 360 – CloudBots: Harvesting Crypto Coins Like A Botnet Farmer

InfoSecurity - Is SSL Secure? Cutting Through The Paranoia

CactusCon - Python: Because Exploit Code Should Look Pretty

Dark Reading - Understanding And Prioritizing Today’s Threats

CactusCon - Malware and the Syrian Civil War

ISACA Phoenix - Protection of Information Assets

RSA – Cloud Ninja: Catch Me If You Can!

Greater Phoenix Economic Council – Ambassador Event: Cyber Security Panel Discussion

MISTI - ITAC 2013 - Wireless Network Risks and Controls

MISTI - Mobile and Smart Device Security 2013

Root The Box

ToorCon San Diego - I Can Have DarkNet & MeshNet Best Practices?

ToorCon San Diego - Rickrolling Your Neighbors With Google Chromecast

CyberFest 2013 - Practical Mobile Security: Security For The Rest Of Us

Need a Cybersecurity Expert to Speak at Your Event?

Please get in touch with our Speaker Bureau program manager, Virginie Jenck. Please email her at contact@bishopfox.com

More...

Subscribe to Updates