Oklahoma's Premiere Information Security Conference

April 30th, 2021

It’s official. We’re back and going virtual for 2021.

Register to Attend

to Join the Chat
Click Here!

You can find all the conversations on our Slack channel. Click the link above to join the conversation and engage with our speakers and the other conference goers’!

See our full list of rooms below!

Please note: You must sign in to Slack at https://slack.techlahoma.com to use the quick track links above.


We’ll be hosting the conference live on April 30th. The conference will start at 9AM CST and run for 6 – 7 hours, or until we’re tired. We’re looking at three tracks with a blend of defensive security, offensive security, and security auditing.

All streams will be hosted here directly, so we look forward to you joining us on April 30th!


You’re here! You deserve some swag! Use the link below to sign up for swag and we’ll send you some awesome goodies.


Follow us for the latest news on the conference on Twitter.


Are you looking to sponsor? Check out our FAQ for more information.


BSidesOK is a community run event. We depend on your support and sponsors to bring you this event each each.

As always, we had some fantastic support that’s helped us navigate these Covid times. Be sure to check out these sponsors that helped bring 2021’s conference together!

Virtually Awesome

Secure Ideas
True Digital Security

The Show Must Go On

Alias Forensics
Go Security Pro


We’re proud to bring you three information security tracks this year.


We are thrilled to announce that Tanya Janca will be joining us as our keynote speaker.

Kicking Off

9:00 CDT

Tanya Janca

Tanya Janca

Founder of WeHackPurple

Tanya Janca, also known as SheHacksPurple, is the best-selling author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won countless awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). She has worn many hats; startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger & streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion and kindness, which shines through in her countless initiatives.

Advisor: Cloud DefenseNeuraLegionICTC PACWoSEC

Founder: We Hack PurpleWoSEC International (Women of Security), OWASP DevSlop#CyberMentoringMonday

10:00 CDT


Threat Hunting | Practical Proving in creative way like a detection and efficiency test in security sensors


Analytics Anyone Can Do

Ochaun Marshall

A Shock to the System: Static Analysis for Real AppSec

11:00 CDT


Securing Docker Containers: Kubernetes just handles that, right?


Best Laid Audit Plans


B&E from A-Z

11:30 CDT


Impostor syndrome in the IT world from a conference speaker’s perspective


I hate lawyers! Working with attorneys during breaches to maintain privilege and your sanity


Discovering C&C in Malicious PDF with obfuscation, encoding and other techniques

12:00 CDT


Pretesting the Low Hanging Fruit


Machine Learning for Auditors


ProxyLogon – The Vulnerability That Shook the World: Why AppSec Matters

1:00 CDT


Security on a Budget: Building Security from Scratch


CMMC: A Compliance Journey


Exploring the Hacker Mentality for Positive Solutions

2:00 CDT


Inside The Mind of a Threat Actor: Beyond Pentesting


CISA Examination Preparation

Michael Gough

Incident Response Fails – What we see with our clients, and their fails, preparation will save you a ton of $$$, heartache, maybe your sanity and job


3:00 CDT


Scalable, Sustainable Cybersecurity for Any Size Organization

Joe Sullivan

Data Governance Programs

Geoff Wilson

Protect Your Business by Adopting a Security Framework


4:00 CDT


Look at me, I’m the Adversary now: Introduction to Adversary Emulation and its place in Security Operations


Don’t Blame the Intern


Build Your First Security App in the Cloud


4:30 CDT


GoLang App build version in Containers & HealthChecks in gRPC Containers for Kubernetes


Ways to make cybersecurity training more engaging


Continuous Security by Design


5:00 CDT

Closing Remarks


Code of Conduct

Everyone deserves to attend a learning event, community or professional, with a reasonable expectation of good behavior. The BSidesOK Team expects that while attending this conference you treat everyone with the love and respect you wish to receive. This applies to all attendees, speakers, volunteers, vendors, and anyone in between. We feel that if you do that, then this conference will once again run smoothly and we will all have a good time.

Don’t be an ass!