Information Warfare Summit

Redefining Normal

Welcome back to our 14th year! We’re back and ready to bring things back to normal. Join us for our star-studded speaker line-up, food, swag, and rebuilding your connections!

October 6th, 2021

Oklahoma Christian University

Book Your Ticket Now

Get a Copy of Scott Augenbaum's Book

Stop by the registration desk for a complimentary copy of Scott Augenbaum’s book.

The first 200 attendees can snag a copy of “The Secret to Cybersecurity”.

Sponsored By

CyberSixGill

Meet Our Keynote

Scott Augenbaum

Scott Augenbaum

Cybercrime Keynote Speaker | Retired FBI Supervisory Special Agent of Cyber Division | Author

After joining the Federal Bureau of Investigation (FBI) in the New York Field Office in 1988 as a support employee, Scott Augenbaum became a Special Agent in 1994 and was assigned to the Syracuse, New York Office, where he worked domestic terrorism, white collar and hate crimes, and all computer crime investigations. In October 2003, Agent Augenbaum was promoted to Supervisory Special Agent at FBI Headquarters, Washington D.C in the Cyber Division, Cyber Crime Fraud Unit and was responsible for managing the FBI’s Cyber Task Force Program and Intellectual Property Rights Program. In 2006, Mr. Augenbaum transferred to Nashville, TN and managed the FBI Memphis Division Computer Intrusion/Counterintelligence Squad in Nashville, TN.

Over the past ten years, Retired Special Agent Scott Augenbaum has had the opportunity to provide hundreds of computer intrusion threat briefings with the goal of educating the community on emerging computer intrusion threats and how to not to be the victim of a data breach.

Scott earned an MBA at American Sentinel University in Information Technology and a Masters Certificate in Information Security Management from Villanova University in addition to holding numerous General Information Assurance Certifications.

Social

Continued Learning

We are hosting two half-day learning sessions with  exceptional members of the community. Expand your networking and job options with our Career room. Get real world experience with the Tools of the Trade for cybersecurity.

Career Room

Hosted by Melanie Hendricks.

Melanie Hendricks

Discover New Opportunities in the Career Room. Melanie works with individuals to fine tune their resumes, improve their interviewing skills, & advance their career paths.

Melanie has over 10 years’ experience in Technology Staffing and over 20 years in Technology-related Corporate Sales.

Melanie is very active in the Security community & you might recognize her for her repeat participation as a speaker, supporter, or sponsor of the ISSA, ISACA, IIA, BSides, IWS (Information Warfare Summit), & The Information Symposium.

Melanie currently works with clients locally & all over the USA to place candidates in a variety of technology-centric positions.
Some examples include: CIOs/CTOs/IT Directors, Security, Networking, Infrastructure, Applications & Development, DevOps, Project Managers, etc.

Tools of the Trade

Hosted by Jonathan Kimmitt.

Jonathan Kimmit

In the world of cyber security, many forget that one of the greatest vulnerabilities to an organization is through poor physical security.  Understanding the risks to physical devices and locations is extremely important in protecting our people, data, and systems.  In this session we will be exploring a variety of hardware tools that are used by attackers to capture data, gain access, and otherwise bypass security controls. 

We will be covering tools such as key loggers,  prox cloners, physical key manufacturing, physical door/lock bypass tools, and many more.   There will be several hands on labs learning how to use, improvise and defend against these tools.

If you have ever wanted to learn how to pick locks with paper clips, use a milk jug to open a locked door, or if you want to see how to protect yourself from key loggers, card cloners, and malicious wireless tools, stop by and lets talk about the physical side of cyber security!

Find Your Favorite Talks

We’ve got an amazing line up of talks and speakers ready to keep your skills sharp and mind informed.

CONFERENCE SCHEDULE

Opening Remarks

John deSteiguer - President of Oklahoma Christian University

Chad Kliewer - President of Infragard Oklahoma

Baugh Auditorium

Are You Prepared Or Are You The Next Victim?

Retired FBI Special Agent and Author of the Secret to CyberSecurity, A Simple Plan to Protect Your Family and Business, Scott Augenbaum spent thirty years with the FBI with two decades handling Cybercrime investigations.  He interviewed over a 1,000 Cybercrime victims and discovered a majority of the incidents could have easily been prevented if the victims had a "Cybersecure Mindset".  Scott is going to explain how the same issues facing companies today are the same issues he's been speaking about for the past decades. Learn the commonalities in almost all Cybercrime incidents and Scott is going to explain his simple framework which could easily reduce your organization's chances of becoming the next Cybercrime victim.

Scott Augenbaum

Baugh Auditorium

Self-Programming Security Controls - Are We There Yet?

As cloud based analytics has transformed the security landscape, automation of security controls looms close on the horizon. Will self-programming security controls be the new normal? What will human security professionals do in the new world order?

Christopher Yates

Baugh Auditorium

Scaling our Impact

Cyber defense is more challenging today than ever. Attackers are well funded, IT systems have been overhauled, and everyone with a pocket book is now a target. In this talk, Geoff Wilson, CEO and Founder of Go Security Pro, will discuss practical strategies for scaling our impact in Cybersecurity.

Geoff Wilson - Go Security Pro

Baugh Auditorium

XDR- Oh Great....Another Acronym?

EDR, MDR, NDR, what's the next "DR"? It's XDR. Let's demystify the hype behind XDR, what it is and what it isn't, and what it will mean to your organization and this industry.

Rick Kennedy - Optiv

Baugh Auditorium

Arrest the CISO! U.S. v. Sullivan and what it means for criminal liability for data breaches

Last year prosecutors brought charges against Joe Sullivan, CSO of Uber, for covering up a data breach. While the case is in the initial stages, it raises questions about whether similar charges will be brought against executives that fail to report breaches.

Anthony Hendricks - Crowe & Dunlevy

Baugh Auditorium

From the Tiniest Flaw to a Full Ransomware Event: A Hacker's Perspective

The tiniest Flaw in an information system can result in a devastating breach. As a professional penetration tester, I'll cover use cases and methodologies from real world hacks. We'll dive into all the technical details and discuss strategies to mitigate the threats.

2021 has been full of ransomware and supply chain attacks in the news, but we've never gotten a full breakdown of how hackers got their foothold. Join us as we discuss real world attacks, the hacker mindset, and the strategies your organization can use to shut down an attempted breach.

Kris Wall - Critical Fault

Baugh Auditorium

The Cyber Arms Race: An analysis of Conti Ransomware tool leak

Insider threats happen to bad guys too. Recently a Conti ransomware affiliate was burned and released all the tools and documentation provided to him. We'll take a look at the TTP's outlined in the tool release and compare them against real world ransomware engagements we've worked.

Andrew Lemon - Alias Infosec

Baugh Auditorium

Is Security Awareness enough to protect your organization?

Organizations have a security awareness and training programs. but how many of the employees take it, retain it, or use it? If the program is useful, why do breaches continue to occur? Thus the next evolution of security awareness needs to be an influential security culture. No more ID-10-T errors!

James McQuiggan - KnowBe4

Baugh Auditorium

Home is Where the Hack Is

The pandemic has fast-tracked remote work.  Employees are enjoying the convenience of working from home with full connectivity back to the office. Cheap coffee, PJs and poor network hygiene.  What could go wrong? Join me to learn about how our homes, now more than ever, are the attack vector for gaining access to corporate data as well as earning easy money. 

Jaime Ortiz - Fortinet

Baugh Auditorium

Cyberbullying: Be Prepared!

Last year, due to the Pandemic and health restrictions, millions of young students were forced to go online to attend school. In addition, this resulted in children being exposed to more in this day and age due to social media. With the growth in children having access to smartphones, and the social networking world constantly evolving, online bullying has skyrocketed and has become alarmingly dangerous especially in pre-teens to young adults.
This talk will explore the world of cyberbullying, what it is and why it needs addressing just as we are addressing other serious cyber-criminal activity. We will learn how to detect cyberbullying, how to intervene, and what steps you can take as a parent, guardian, or educator to prevent cyberbullying.

Curtis Coleman - Oklahoma Christian

Baugh Auditorium

4:00

Hall Con

Go mingle!

Expo Area

4:30

Closing Ceremonies & Door Prizes

IWS Crew

Baugh Auditorium

5:00

Afterparty!

Come grab a drink with us!

Sponsored by Optiv and Palo Alto. Give them thanks for the drinks!

Main Event - 1441 W Memorial Rd, Oklahoma City, OK 73114

TRACK 2

Army Cyber Security Panel hosted by Kevin Turner

Kevin Turner will host the joint Oklahoma Military/State Team panel with commander National Guard Cyber Command Captain Dan Slusarchuk, this year sharing behind the scenes discussion from team members that participated in Cyber Shield 2021.

Kevin Turner - Solara Surgical Partners

Judd Theater

Inside a Ransomware Incident

This presentation is an extension of the SANS Rekt Casino series which is based on numerous real world ransomware attacks.
In this presentation I will talk about what it's like from the incident responder perspective, the IT team perspective, and from the business perspective.
I will cover how to respond to the incident, negotiating with the attackers, recovering from the attack, and reporting to the business as an independent consultant, or as a member of the IT or security team.

Things never go as planned and this provides good insight as to what actually happens behind the scenes and how things can go very wrong with the appropriate preparation.

Joe Sullivan - ANTICRYSYS

Judd Theater

DevSecOops!: Application Development Security and YOU!

"Dependencies, pipelines, and vulnerabilities -- Oh, my!

Security teams and developers are often at odds with one another. With the fast and furious adoption of agile development cycles, how can we, as security professionals stay on top? Bridging the gap is now more important than ever!"

Stacy Dunn - Snyk

Judd Theater

Biohacker: The Invisible Threat

Security professionals won't allow users into their environment with hacking tools, so how do you address people with implants? People are the attack vector and the tool. The ability to compromise contactless tech threatens physical & digital security. How do you stop a Cyber threat from a human?

Len Noe - CyberArk Software

Judd Theater

Third-Party Risk Management & Supply Chain Security

COVID demonstrated to the world that supply chains are critical to our society and are vulnerable to many different types of disruptions. Not just cyber security disruptions.

Gordon Rudd - Stone Creek Coaching

Judd Theater

4:00

Hall Con

Go mingle!

Expo Area

4:30

Closing Ceremonies & Door Prizes

IWS Crew

Baugh Auditorium

5:00

Afterparty!

Come grab a drink with us!

Sponsored by Optiv and Palo Alto. Give them thanks for the drinks!

Main Event - 1441 W Memorial Rd, Oklahoma City, OK 73114

TRACK 3

12:00

Josh Poyner

Making Cybersecurity Training Fun Through Small Scale CTF Events

Cybersecurity training is usually low on everyone's priority list, often falling to the individual practitioners to deal with on their own time. By neglecting training we are letting our cybersecurity knowledge atrophy, increasing the time it takes to identify bad actors and resolve threats. By using open source tools and frameworks, running small scale CTF's becomes a fun and easy way to train your staff on how to recognize and deal with threats.

In this session - Learn what free training tools you have at your disposal, how to run your first small scale CTF, and level up your Security Analysts the fun way!

Joseph Poyner is a Strategic Sales engineer for SentinelOne and is dedicated to making the world more secure by helping his customers deploy world class cybersecurity solutions. Over his 10+ years in the Cybersecurity field, Joseph has worked for 4 different EDR vendors and he uses that depth of knowledge when consulting with customers. Joseph also maintains his CISSP and volunteers with local groups that focus on teaching youth STEM and Cybersecurity topics.

Joseph Poyner - Sentinel One

Adams Recital Hall

12:30

Lakeboy

Safeguarding Privacy: Evolving FTC Regulations for Safeguarding Consumer Financial Information

Have you reviewed your organization's governmental information security compliance requirements? This talk is a cheat sheet for evolving FTC InfoSec safeguards required of organizations electing to store consumer financial information.

An executive at a large financial institution, hit with thousands of regulatory audit findings, recently said to me, “Where is it written that I have to implement certain information security safeguards? People have been saying that to me for years, so I went to find out. Join me for an opinionated review of the federal statutory foundations and evolving FTC regulatory requirements on “other persons” to implement and maintain information security safeguards. Plus, how could anyone miss a compliance-risk-feature-chart-road-map-cheat-sheet based upon a headless job analysis? Anyone? Beuler? Beuler? Ok, so I will try and make it as fun as I can.An executive at a large financial institution, hit with thousands of regulatory audit findings, recently said to me, “Where is it written that I have to implement certain information security safeguards? People have been saying that to me for years, so I went to find out. Join me for an opinionated review of the federal statutory foundations and evolving FTC regulatory requirements on “other persons” to implement and maintain information security safeguards. Plus, how could anyone miss a compliance-risk-feature-chart-road-map-cheat-sheet based upon a headless job analysis? Anyone? Beuler? Beuler? Ok, so I will try and make it as fun as I can.

Steve Russell - Nodeout Perspective

Adams Recital Hall

Google is making us more vulnerable

Many new and experienced developers turn to Google for code examples when building software. Some will even copy and paste these examples into their project and publish without thinking twice. How is this affecting our systems' security?

Jeff Maxwell - Oklahoma City University

Adams Recital Hall

It's INFORMATION warfare after all...

Every Info Sec career has a report writing moment (likely several). Be it an email brief to management or a risk assessment, incident response, metrics or executive report. Your CEO, Board, VP, CISO, CIO, Director, etc. will thank you for learning these tips for successful Info Sec writing.

Daisha Pennie - Oklahoma State University

Adams Recital Hall

Protecting the penguin! Linux security as armor!

This is mission critical defense for your Linux systems! Red team rascals on the the outside, check! How do you make the the inside sider threat a non starter? And the worst gut check of all - the auditors! Come to this talk and learn documents to learn from and practices to don Lets suit up!

John Robertson

Adams Recital Hall

Level Up Your SIEM Game with OSSEM: The Open Source Security Events Metadata (OSSEM)

Learn about the OSSEM project and how it is being implemented in Azure Sentinel to normalize events from all types of sources, making searching your logs easier than ever. You will learn some Kusto Query Language (KQL) during the talk, but you don't need to know it beforehand.

John Spaid

Adams Recital Hall

4:00

Hall Con

Go mingle!

Expo Area

4:30

Closing Ceremonies & Door Prizes

IWS Crew

Baugh Auditorium

5:00

Afterparty!

Come grab a drink with us!

Sponsored by Optiv and Palo Alto. Give them thanks for the drinks!

Main Event - 1441 W Memorial Rd, Oklahoma City, OK 73114

After Party at Main Event

1441 W Memorial Rd, Oklahoma City, OK 73114

Our after party is sponsored by Optiv. Come grab a drink and hang out with us.

Meet Our Sponsors

The Information Warfare Summit couldn’t happen without the support of our sponsors.

Critical Start

Diamond

Optiv

After Party!

American Fidelity

Platinum

Go Security Pro

Platinum

Oklahoma Christian University

Gold

Alias Infosec

Gold

KnowBe4

Gold

CyberSixGill

Keynote & Pre-Party

Fortinet

Gold

Critical Fault

Silver

Recorded Future

Silver

Set Solutions

Silver

Rapid7

Silver

SentinelOne

Silver

Guidepoint Security

Silver

Secure Ideas

Silver

Artic Wolf

Silver

Varonis

Bronze

Where can we find everything?

Come join us in the Garvey Center at Oklahoma Christian. Park near the building and come join the fun!