
Oklahoma's Premiere Information Security Conference
April 30th, 2021It’s official. We’re back and going virtual for 2021.
Join Our Live Streams
Sign-In to Join the Chat
Click Here!
You can find all the conversations on our Slack channel. Click the link above to join the conversation and engage with our speakers and the other conference goers’!
See our full list of rooms below!
Please note: You must sign in to Slack at https://slack.techlahoma.com to use the quick track links above.
Conference
We’ll be hosting the conference live on April 30th. The conference will start at 9AM CST and run for 6 – 7 hours, or until we’re tired. We’re looking at three tracks with a blend of defensive security, offensive security, and security auditing.
All streams will be hosted here directly, so we look forward to you joining us on April 30th!
Swag
You’re here! You deserve some swag! Use the link below to sign up for swag and we’ll send you some awesome goodies.
News
Follow us for the latest news on the conference on Twitter.
Sponsors
Are you looking to sponsor? Check out our FAQ for more information.
Sponsors
BSidesOK is a community run event. We depend on your support and sponsors to bring you this event each each.
As always, we had some fantastic support that’s helped us navigate these Covid times. Be sure to check out these sponsors that helped bring 2021’s conference together!
Virtually Awesome
Schedule
We’re proud to bring you three information security tracks this year.
Keynote
We are thrilled to announce that Tanya Janca will be joining us as our keynote speaker.
Kicking Off
9:00 CDT

Tanya Janca
Founder of WeHackPurple
Tanya Janca, also known as SheHacksPurple, is the best-selling author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack Purple, an online learning academy, community and podcast that revolves around teaching everyone to create secure software. Tanya has been coding and working in IT for over twenty years, won countless awards, and has been everywhere from startups to public service to tech giants (Microsoft, Adobe, & Nokia). She has worn many hats; startup founder, pentester, CISO, AppSec Engineer, and software developer. She is an award-winning public speaker, active blogger & streamer and has delivered hundreds of talks and trainings on 6 continents. She values diversity, inclusion and kindness, which shines through in her countless initiatives.
Advisor: Cloud Defense, NeuraLegion, ICTC PAC, WoSEC
Founder: We Hack Purple, WoSEC International (Women of Security), OWASP DevSlop, #CyberMentoringMonday
10:00 CDT

Threat Hunting | Practical Proving in creative way like a detection and efficiency test in security sensors

Analytics Anyone Can Do

A Shock to the System: Static Analysis for Real AppSec
11:00 CDT

Securing Docker Containers: Kubernetes just handles that, right?

Best Laid Audit Plans

B&E from A-Z
11:30 CDT

Impostor syndrome in the IT world from a conference speaker’s perspective

I hate lawyers! Working with attorneys during breaches to maintain privilege and your sanity

Discovering C&C in Malicious PDF with obfuscation, encoding and other techniques
12:00 CDT

Pretesting the Low Hanging Fruit

Machine Learning for Auditors

ProxyLogon – The Vulnerability That Shook the World: Why AppSec Matters
1:00 CDT

Security on a Budget: Building Security from Scratch

CMMC: A Compliance Journey

Exploring the Hacker Mentality for Positive Solutions
2:00 CDT

Inside The Mind of a Threat Actor: Beyond Pentesting

CISA Examination Preparation

Incident Response Fails – What we see with our clients, and their fails, preparation will save you a ton of $$$, heartache, maybe your sanity and job
3:00 CDT

Scalable, Sustainable Cybersecurity for Any Size Organization

Data Governance Programs

Protect Your Business by Adopting a Security Framework
4:00 CDT

Look at me, I’m the Adversary now: Introduction to Adversary Emulation and its place in Security Operations

Don’t Blame the Intern

Build Your First Security App in the Cloud
4:30 CDT

GoLang App build version in Containers & HealthChecks in gRPC Containers for Kubernetes

Ways to make cybersecurity training more engaging

Continuous Security by Design
5:00 CDT
Closing Remarks

Code of Conduct
Everyone deserves to attend a learning event, community or professional, with a reasonable expectation of good behavior. The BSidesOK Team expects that while attending this conference you treat everyone with the love and respect you wish to receive. This applies to all attendees, speakers, volunteers, vendors, and anyone in between. We feel that if you do that, then this conference will once again run smoothly and we will all have a good time.
Don’t be an ass!