Oklahoma's Premiere Information Security Conference

April 30th, 2021

It’s official. We’re back and going virtual for 2021.

Register to Attend

Sign-In to Join the Chat
Click Here!

You can find all the conversations on our Slack channel. Click the link above to join the conversation and engage with our speakers and the other conference goers’!

See our full list of rooms below!

Please note: You must sign in to Slack at https://slack.techlahoma.com to use the quick track links above.

Conference

We’ll be hosting the conference live on April 30th. The conference will start at 9AM CST and run for 6 – 7 hours, or until we’re tired. We’re looking at three tracks with a blend of defensive security, offensive security, and security auditing.

All streams will be hosted here directly, so we look forward to you joining us on April 30th!

Swag

You’re here! You deserve some swag! Use the link below to sign up for swag and we’ll send you some awesome goodies.

News

Follow us for the latest news on the conference on Twitter.

Sponsors

Are you looking to sponsor? Check out our FAQ for more information.

Sponsors

BSidesOK is a community run event. We depend on your support and sponsors to bring you this event each each.

As always, we had some fantastic support that’s helped us navigate these Covid times. Be sure to check out these sponsors that helped bring 2021’s conference together!

Virtually Awesome

okta
optiv
fortinet
Secure Ideas
Arctic-Wolf-Pinnacle
True Digital Security

The Show Must Go On

Stackhawk
Alias Forensics
Go Security Pro

Schedule

We’re proud to bring you three information security tracks this year.

Keynote

We are thrilled to announce that Tanya Janca will be joining us as our keynote speaker.

Kicking Off

9:00 CDT

Tanya Janca

Tanya Janca

Founder of WeHackPurple

Tanya Janca, also known as SheHacksPurple, is the best-selling author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won countless awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). She has worn many hats; startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger & streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion and kindness, which shines through in her countless initiatives.

Advisor: Cloud DefenseNeuraLegionICTC PACWoSEC

Founder: We Hack PurpleWoSEC International (Women of Security), OWASP DevSlop#CyberMentoringMonday

10:00 CDT

pires

Threat Hunting | Practical Proving in creative way like a detection and efficiency test in security sensors

Russell

Analytics Anyone Can Do

Ochaun Marshall

A Shock to the System: Static Analysis for Real AppSec

11:00 CDT

richardson

Securing Docker Containers: Kubernetes just handles that, right?

tirado

Best Laid Audit Plans

lemon

B&E from A-Z

11:30 CDT

Hackerman

Impostor syndrome in the IT world from a conference speaker’s perspective

A_Hendricks

I hate lawyers! Working with attorneys during breaches to maintain privilege and your sanity

pires

Discovering C&C in Malicious PDF with obfuscation, encoding and other techniques

12:00 CDT

Farrow

Pretesting the Low Hanging Fruit

tirado

Machine Learning for Auditors

wall

ProxyLogon – The Vulnerability That Shook the World: Why AppSec Matters

1:00 CDT

biswas

Security on a Budget: Building Security from Scratch

scott

CMMC: A Compliance Journey

AaronCrawford

Exploring the Hacker Mentality for Positive Solutions

2:00 CDT

wylie

Inside The Mind of a Threat Actor: Beyond Pentesting

Cascarino

CISA Examination Preparation

Michael Gough

Incident Response Fails – What we see with our clients, and their fails, preparation will save you a ton of $$$, heartache, maybe your sanity and job

 

3:00 CDT

tirado

Scalable, Sustainable Cybersecurity for Any Size Organization

Joe Sullivan

Data Governance Programs

Geoff Wilson

Protect Your Business by Adopting a Security Framework

 

4:00 CDT

kimmons

Look at me, I’m the Adversary now: Introduction to Adversary Emulation and its place in Security Operations

weller

Don’t Blame the Intern

evans

Build Your First Security App in the Cloud

 

4:30 CDT

karthik

GoLang App build version in Containers & HealthChecks in gRPC Containers for Kubernetes

s_marshall

Ways to make cybersecurity training more engaging

richardson

Continuous Security by Design

 

5:00 CDT

Closing Remarks

hackerman

Code of Conduct

Everyone deserves to attend a learning event, community or professional, with a reasonable expectation of good behavior. The BSidesOK Team expects that while attending this conference you treat everyone with the love and respect you wish to receive. This applies to all attendees, speakers, volunteers, vendors, and anyone in between. We feel that if you do that, then this conference will once again run smoothly and we will all have a good time.

Don’t be an ass!