Information Warfare Summit

October 6th, 2021

Oklahoma Christian University

Registration is now open!

Book Your Ticket Now

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

Meet Our Keynote

Scott Augenbaum

Scott Augenbaum

Cybercrime Keynote Speaker | Retired FBI Supervisory Special Agent of Cyber Division | Author

After joining the Federal Bureau of Investigation (FBI) in the New York Field Office in 1988 as a support employee, Scott Augenbaum became a Special Agent in 1994 and was assigned to the Syracuse, New York Office, where he worked domestic terrorism, white collar and hate crimes, and all computer crime investigations. In October 2003, Agent Augenbaum was promoted to Supervisory Special Agent at FBI Headquarters, Washington D.C in the Cyber Division, Cyber Crime Fraud Unit and was responsible for managing the FBI’s Cyber Task Force Program and Intellectual Property Rights Program. In 2006, Mr. Augenbaum transferred to Nashville, TN and managed the FBI Memphis Division Computer Intrusion/Counterintelligence Squad in Nashville, TN.

Over the past ten years, Retired Special Agent Scott Augenbaum has had the opportunity to provide hundreds of computer intrusion threat briefings with the goal of educating the community on emerging computer intrusion threats and how to not to be the victim of a data breach.

Scott earned an MBA at American Sentinel University in Information Technology and a Masters Certificate in Information Security Management from Villanova University in addition to holding numerous General Information Assurance Certifications.

Social

Find Your Favorite Talks

We’ve got an amazing line up of talks and speakers ready to keep your skills sharp and mind informed.

CONFERENCE SCHEDULE

Opening Remarks

Chad Kliewer

Baugh Auditorium

Are You Prepared Or Are You The Next Victim?

Retired FBI Special Agent and Author of the Secret to CyberSecurity, A Simple Plan to Protect Your Family and Business, Scott Augenbaum spent thirty years with the FBI with two decades handling Cybercrime investigations.  He interviewed over a 1,000 Cybercrime victims and discovered a majority of the incidents could have easily been prevented if the victims had a "Cybersecure Mindset".  Scott is going to explain how the same issues facing companies today are the same issues he's been speaking about for the past decades. Learn the commonalities in almost all Cybercrime incidents and Scott is going to explain his simple framework which could easily reduce your organization's chances of becoming the next Cybercrime victim.

Scott Augenbaum

Baugh Auditorium

Self-Programming Security Controls - Are We There Yet?

As cloud based analytics has transformed the security landscape, automation of security controls looms close on the horizon. Will self-programming security controls be the new normal? What will human security professionals do in the new world order?

Christopher Yates

Baugh Auditorium

Scaling our Impact

Cyber defense is more challenging today than ever. Attackers are well funded, IT systems have been overhauled, and everyone with a pocket book is now a target. In this talk, Geoff Wilson, CEO and Founder of Go Security Pro, will discuss practical strategies for scaling our impact in Cybersecurity.

Geoff Wilson - Go Security Pro

Baugh Auditorium

XDR- Oh Great....Another Acronym?

EDR, MDR, NDR, what's the next "DR"? It's XDR. Let's demystify the hype behind XDR, what it is and what it isn't, and what it will mean to your organization and this industry.

Rick Kennedy - Optiv

Baugh Auditorium

Arrest the CISO! U.S. v. Sullivan and what it means for criminal liability for data breaches

Last year prosecutors brought charges against Joe Sullivan, CSO of Uber, for covering up a data breach. While the case is in the initial stages, it raises questions about whether similar charges will be brought against executives that fail to report breaches.

Anthony Hendricks - Crowe & Dunlevy

Baugh Auditorium

From the Tiniest Flaw to a Full Ransomware Event: A Hacker's Perspective

The tiniest Flaw in an information system can result in a devastating breach. As a professional penetration tester, I'll cover use cases and methodologies from real world hacks. We'll dive into all the technical details and discuss strategies to mitigate the threats.

2021 has been full of ransomware and supply chain attacks in the news, but we've never gotten a full breakdown of how hackers got their foothold. Join us as we discuss real world attacks, the hacker mindset, and the strategies your organization can use to shut down an attempted breach.

Kris Wall - Critical Fault

Baugh Auditorium

The Cyber Arms Race: An analysis of Conti Ransomware tool leak

Insider threats happen to bad guys too. Recently a Conti ransomware affiliate was burned and released all the tools and documentation provided to him. We'll take a look at the TTP's outlined in the tool release and compare them against real world ransomware engagements we've worked.

Andrew Lemon - Alias Infosec

Baugh Auditorium

Is Security Awareness enough to protect your organization?

Organizations have a security awareness and training programs. but how many of the employees take it, retain it, or use it? If the program is useful, why do breaches continue to occur? Thus the next evolution of security awareness needs to be an influential security culture. No more ID-10-T errors!

James McQuiggan - KnowBe4

Baugh Auditorium

Fortinet

TBD

Jaime Ortiz

Baugh Auditorium

Cyberbullying: Be Prepared!

Last year, due to the Pandemic and health restrictions, millions of young students were forced to go online to attend school. In addition, this resulted in children being exposed to more in this day and age due to social media. With the growth in children having access to smartphones, and the social networking world constantly evolving, online bullying has skyrocketed and has become alarmingly dangerous especially in pre-teens to young adults.
This talk will explore the world of cyberbullying, what it is and why it needs addressing just as we are addressing other serious cyber-criminal activity. We will learn how to detect cyberbullying, how to intervene, and what steps you can take as a parent, guardian, or educator to prevent cyberbullying.

Curtis Coleman - Oklahoma Christian

Baugh Auditorium

4:00

Hall Con

Go mingle!

Expo Area

4:30

Closing Ceremonies & Door Prizes

IWS Crew

Baugh Auditorium

5:00

Afterparty!

Come grab a drink with us!

Sponsored by Optiv and Palo Alto. Give them thanks for the drinks!

Main Event - 1441 W Memorial Rd, Oklahoma City, OK 73114

TRACK 2

Army Cyber Security Panel hosted by Kevin Turner

Kevin Turner will host the joint Oklahoma Military/State Team panel with commander National Guard Cyber Command Captain Dan Slusarchuk, this year sharing behind the scenes discussion from team members that participated in Cyber Shield 2021.

Kevin Turner - Solara Surgical Partners

Judd Theater

Inside a Ransomware Incident

This presentation is an extension of the SANS Rekt Casino series which is based on numerous real world ransomware attacks.
In this presentation I will talk about what it's like from the incident responder perspective, the IT team perspective, and from the business perspective.
I will cover how to respond to the incident, negotiating with the attackers, recovering from the attack, and reporting to the business as an independent consultant, or as a member of the IT or security team.

Things never go as planned and this provides good insight as to what actually happens behind the scenes and how things can go very wrong with the appropriate preparation.

Joe Sullivan - Crossroads Information Security

Judd Theater

DevSecOops!: Application Development Security and YOU!

"Dependencies, pipelines, and vulnerabilities -- Oh, my!

Security teams and developers are often at odds with one another. With the fast and furious adoption of agile development cycles, how can we, as security professionals stay on top? Bridging the gap is now more important than ever!"

Stacy Dunn - Snyk

Judd Theater

Biohacker: The Invisible Threat

Security professionals won't allow users into their environment with hacking tools, so how do you address people with implants? People are the attack vector and the tool. The ability to compromise contactless tech threatens physical & digital security. How do you stop a Cyber threat from a human?

Len Noe - CyberArk Software

Judd Theater

Third-Party Risk Management & Supply Chain Security

COVID demonstrated to the world that supply chains are critical to our society and are vulnerable to many different types of disruptions. Not just cyber security disruptions.

Gordon Rudd - Stone Creek Coaching

Judd Theater

4:00

Hall Con

Go mingle!

Expo Area

4:30

Closing Ceremonies & Door Prizes

IWS Crew

Baugh Auditorium

5:00

Afterparty!

Come grab a drink with us!

Sponsored by Optiv and Palo Alto. Give them thanks for the drinks!

Main Event - 1441 W Memorial Rd, Oklahoma City, OK 73114

TRACK 3

12:00

Lakeboy

Automation and EDR: The new XDR wave

Passive EDR tools were designed to focus on the detection of suspicious activities on endpoints. These tools were different from earlier security solutions in that they did not necessarily focus on identifying specific malware, but instead looked for anomalous activities.

Tommy Hui - Sentinel One

Adams Recital Hall

12:30

Lakeboy

Safeguarding Privacy: Evolving FTC Regulations for Safeguarding Consumer Financial Information

Have you reviewed your organization's governmental information security compliance requirements? This talk is a cheat sheet for evolving FTC InfoSec safeguards required of organizations electing to store consumer financial information.

Steve Russell - Nodeout Perspective

Adams Recital Hall

Google is making us more vulnerable

Many new and experienced developers turn to Google for code examples when building software. Some will even copy and paste these examples into their project and publish without thinking twice. How is this affecting our systems' security?

Jeff Maxwell - Oklahoma City University

Adams Recital Hall

It's INFORMATION warfare after all...

Every Info Sec career has a report writing moment (likely several). Be it an email brief to management or a risk assessment, incident response, metrics or executive report. Your CEO, Board, VP, CISO, CIO, Director, etc. will thank you for learning these tips for successful Info Sec writing.

Daisha Pennie - Oklahoma State University

Adams Recital Hall

Protecting the penguin! Linux security as armor!

This is mission critical defense for your Linux systems! Red team rascals on the the outside, check! How do you make the the inside sider threat a non starter? And the worst gut check of all - the auditors! Come to this talk and learn documents to learn from and practices to don Lets suit up!

John Robertson

Adams Recital Hall

Level Up Your SIEM Game with OSSEM: The Open Source Security Events Metadata (OSSEM)

Learn about the OSSEM project and how it is being implemented in Azure Sentinel to normalize events from all types of sources, making searching your logs easier than ever. You will learn some Kusto Query Language (KQL) during the talk, but you don't need to know it beforehand.

John Spaid

Adams Recital Hall

4:00

Hall Con

Go mingle!

Expo Area

4:30

Closing Ceremonies & Door Prizes

IWS Crew

Baugh Auditorium

5:00

Afterparty!

Come grab a drink with us!

Sponsored by Optiv and Palo Alto. Give them thanks for the drinks!

Main Event - 1441 W Memorial Rd, Oklahoma City, OK 73114

After Party at Main Event

1441 W Memorial Rd, Oklahoma City, OK 73114

Our after party is sponsored by Optiv. Come grab a drink and hang out with us.

Meet Our Sponsors

The Information Warfare Summit couldn’t happen without the support of our sponsors.

Critical Start

Diamond

Optiv

After Party!

American Fidelity

Platinum

Go Security Pro

Platinum

Oklahoma Christian University

Gold

Alias Infosec

Gold

KnowBe4

Gold

Fortinet

Gold

Critical Fault

Silver

Recorded Future

Silver

Set Solutions

Silver

Rapid7

Silver

SentinelOne

Silver

Guidepoint Security

Silver

Secure Ideas

Silver

Artic Wolf

Silver

Varonis

Bronze