Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.
Bishop Fox Live at DEF CON 30 featuring Juneau
As part of our inaugural DEF CON livestream in 2022, our hosts Tom Eston and Joe Sechman spoke to infosec community member Juneau about her professional journey and the topics she's most passionate about.
Bishop Fox Live at DEF CON 30 featuring Tanya Janca
In this session from our DEF CON livestream, Tanya Janca (AKA SheHacksPurple) talks about her books, her security journey, SAST/DAST, and more!
Bishop Fox Live at DEF CON 30 featuring Barrett Darnell
In this session from the Bishop Fox DEF CON 30 livestream, Principal Security Engineer at Intuit & former Fox Barrett Darnell stops by to chat with hosts Tom Eston and Joe Sechman.
Bishop Fox Live at DEF CON 30 featuring Yael Basurto Esquivel
Listen to Bishop Fox Security Consultant Yael Basurto Esquivel discuss some of his latest infosec research during this DEF CON 30 interview!
Bishop Fox Live at DEF CON 30 featuring Steve Ragan
Check out this DEF CON 30 livestream snippet with security storyteller and editor at Cisco Steve Ragan!
Bishop Fox Live at DEF CON 30 featuring Barry MacLaughlin
In this closing interview from the Bishop Fox DEF CON 30 livestream, Senior Director of Recruiting Barry MacLaughlin discusses hiring, what makes a winning security culture, and more.
Bishop Fox Live at DEF CON 30 featuring DFIR Matt Scheuer
Tune in to this snippet from the Bishop Fox DEF CON livestream 30 where Tom Eston and Joe Sechman interview DFIR Matt Scheuer, host of the ThreatReel podcast.
Breaking & Entering: A Pocket Guide for Friendly Remote Admins
This user-friendly guide offers a comprehensive offensive security roadmap for sysadmins, penetration testers, and other security professionals.
21 Questions with Teresa Richardson, VP of Revenue Operations
When you think of cybersecurity… what do you picture? A guy in a hoodie behind a keyboard? We don’t blame you. But Teresa is here to show you that women in cybersecurity are on the rise and ready to even the playing field.
What the Vuln: EDR Bypass with LoLBins
Watch the second episode of our What the Vuln livestream series as we explore how to bypass endpoint detection and response (EDR) with native Windows binaries to gain advanced post-exploitation control.
21 Questions with Kaitlin O'Neil, Recruiting Manager
When you think of cybersecurity… what do you picture? A guy in a hoodie behind a keyboard? We don’t blame you. But Kaitlin is here to show you that women in cybersecurity are on the rise and ready to even the playing field.
21 Questions with Sarah Ferenczi, Security Consultant II
When you think of cybersecurity… what do you picture? A guy in a hoodie behind a keyboard? We don’t blame you. But Sarah is here to show you that women in cybersecurity are on the rise and ready to even the playing field.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.