Information Warfare Summit Returns

4 October 2022

2501 E Memorial Rd, Edmond, OK 73013

Join us for our 15th year on October 4, 2022, for the return Oklahoma’s longest running cybersecurity conference, the Information Warfare Summit 15!

Information Warfare Summit 15 - 2022

Get Tickets Now

Event sign up is now ready. Reserve your spot at Oklahoma’s Premiere cybersecurity summit!


We’re full up on Sponsors! Send us an email if you’d like to join the waitlist. We’ll let you know if a spot opens up.

About Event

27 reknown speakers. 4 tracks. Community Room. Catered Lunch. And Zombies! 


Oklahoma Christian

Meinders Hall

2501 E Memorial Rd, Edmond, OK 73013

Multitude of Speakers

With 27 speakers spread across 4 tracks, there’s something for everyone! Download our IWS 15 Brochure below!

Map of Meinders Hall

Our conference maps are below!

Door Prizes

Get your passport filled out and drop your name in for door prizes! There will be a new Surface Go 3 giveaway!

Meet Our Keynote

We’re thrilled to announce that our keynote this year is a crowd favorite in our industry.

Tammy Moskites


Tammy continually provides strategic guidance to other industry-leading security vendors where she is an Executive Company Advisor and CISO community builder to Adaptive Shield, AppViewX, Blue Lava, Grip Security, Hunters, Raxis, Vectra AI, and previously to RiskIQ, Attivo Networks, Box, Qualys, SecureAuth, and Venafi.

Tammy Moskites

Tammy is the CEO and Founder of CyAlliance. She is a strategic advisor and “Alliance” builder for companies, vendors and startups by leading, building and scaling their security offerings while providing trusted executive advisory services and professional services for companies worldwide. With her 30+ years of technology experience, she is noted by her peers to be a results-driven and passionate executive leader. She is a distinguished career CISO, and she has held many security and technology leadership roles which include; Accenture, Venafi, Time Warner Cable and The Home Depot. She has dedicated her career to guide CISOs worldwide to help defend their organizations from cyber threats and attacks. She is a highly recognized cyber and women in technology social influencer with thousands of followers.

Amongst the many things she is involved in, she is a Venture Advisor to YL Ventures, a Distinguished Fellow with the Ponemon Institute and volunteers her time with organizations including ISACA, Australian Information Security Association (AISA), SheLeadsTech and the ISSA. Tammy hosts CISO Networking events globally to allow CISO’s to share, network and build local relationships. She has spoken at conferences and cyber kickoffs around the world and has received many accolades in recognition for her work within the security industry. She is an internationally recognized keynote/speaker, not only on security and governance, but also on career building, women in technology and leadership mentoring. She is a diversity champion in the market and with the companies she has worked. Tammy dedicates her personal time as a professional independent leadership and career coach/mentor.

Main Track: Dawn of the Dead

Keynote: Tammy Moskites

Main Track: Dawn of the Dead

Platinum Sponsor: Go Security Pro

Main Track: Dawn of the Dead

Diamond Sponsor: Microsoft

(Pssst…! They’re giving away a Surface as a door prize. Be sure to visit their booth.)

Dawn of the Dead

Morning Sessions





Dawn of the Dead



Opening and Welcome

Federal Bureau of Investigation

Dawn of the Dead




Career CISO Tammy Moskites CEO CyAlliance has much to share about leadership & resilience. The Journey of being an Administrative Assistant to owning her own company. Resilience is not just being in charge, it is finding the road to where you want to be Now & in the Future. “It’s The Journey”

With over 30 years in Security and Technology and a Career CISO, Tammy Moskites, CEO and Founder of CyAlliance has much to share about leadership, the journey and resilience. Tammy will share her journey from being an Administrative Assistant to owning her own company. She will share stories, discuss the gaps in recruiting techniques, and how to create high performing teams. She will highlight the importance, individually, of what you can be doing mentally, emotionally, and physically to help you focus where you want to be in your career. Resilience is not just being in charge – it is finding the road to where you want to be now and in the future. The Journey. How her passion around doing the right things right and for the right reasons coupled with a foundation of trust and integrity, will guide you to also find the road to Success. #DoWhatYouLove #LoveWhatYouDo


Tammy Moskites

Harmon Hall



The Hidden Weaknesses in Your Network: What Automation Doesn't Find

Organizations often miss major aspects of their attack surface, leading to exploit opportunities for hackers. Carrie Randolph, Senior Security Consultant of Go Security Pro, will explain how to build an effective vulnerability management program that utilizes not only automated scanning, but also manual testing processes to identify and remediate exploitable weaknesses in your environment. This talk is appropriate for both security leadership and technical cybersecurity personnel.

Carrie Randolph

Dawn of the Dead



Morning Break


Dawn of the Dead



Out of The Frying Pan...

John will discuss industry trends and cybersecurity professionals’ feeling of being burned out, overworked, & overwhelmed. Having left the public sector & industry for a technology company, he will share his insights from both sides of the cybersecurity coin, and how we can do things better.

Starting with an evaluation of the history and evolution of the security industry, John will set the stage for the realization that the situation is not getting any better; in fact, it is much worse than when security became a hot topic and shows no sign of improving. This is leading the industry to an unhealthy state where not only are security efforts ineffective, but people working in security teams are suffering professionally and personally.

Shifting focus, John will talk about how organizations can support their security teams and change the way they think about security to become more effective across the entire organization. He will tie this into Microsoft’s mission to “to empower every person and every organization on the planet to achieve more.” He will reflect on the optimism of that mission, and how it translates into the way we work on security teams.

Finally, John will end with a call for individuals interested in security or working in the industry to change the way they work and think about their careers. Taking positive steps to better their own lives, improve customer and stakeholder security, and “achieve more” are not mutually exclusive requirements.

John Spaid

Dawn of the Dead



Lunch Break


Dawn of the Dead

Afternoon Sessions

4 Full Tracks of Speakers

Afternoon Sessions

Community Room in Resident Evil

Four Afternoon Speaking Tracks

We’re thrilled to present 4 afternoon speaking tracks. (p.s. We upgraded Shaun to Shawn!)

Zombieland | Shawn of the Dead | 28 Days Later | Walking Dead

12:45PM – 30 Minute Sessions

Hacking Trust Establishment

Carrie Randolph


Cyber Recovery – Are You Ready When Things Go Wrong?

Eric Molinaro

Shawn of the Dead

Rules for Surviving Cyberland

Craig Buchanan

28 Days Later

Artic Security — A Global Challenge

Teresa Rule

Walking Dead

1:15PM – 30 Minute Sessions

Butterflies, Black Swans, and Beautiful Metrics Update: How to Thwart Cyberattacks

Curtis Coleman


tl;dr – Threat Intel for beginners

Kallen Curtis

Shawn of the Dead

A Modern Approach to Pentesting Zero Trust Environments

Nathan Sweaney

28 Days Later

Stay Scheming: DOJ’s Cyber Fraud Initiative and What Means for Businesses and Cyber Professionals

Anthony Hendricks

Walking Dead

1:45PM – 30 Minute Sessions

Securing ICS Shouldn’t Be This Hard

Jordan Caldwell


Data Protection 101: DLP and CASB basics

Brett Wyer

Shawn of the Dead

Data Governance and the CISO’s Role

Gordon Rudd

28 Days Later

Emerging Best Practices in Software Supply Chain Security: What We Can Learn from Google, the White House, OWASP, and Gartner

Tony Loehr

Walking Dead

2:15PM – 60 Minute Sessions

Social Engineering for Introverts

Diana Hutcherson


( Laptop Recommended)

Cloud Security Threat Hunting Workshop

Zac Wilson

Shawn of the Dead

The 3:00am Call: Handling The Worst In the Emerging Tech Paradigm

Chris Mallow

28 Days Later

How to Hire or Get Hired in Cybersecurity

Chad Kliewer

Walking Dead

3:15PM – 60 Minute Sessions

Social Engineer your way to Success

Jonathan Kimmitt


Your Cybersecurity Training Sucks

Kevin Sesock

Shawn of the Dead

Building a security intelligence program for Oklahoma-based companies

Rhett Greenhagen

28 Days Later

DCOE Netwars Recap

Kevin Turner

Walking Dead

4:15PM – 30 Minute Sessions

Supercharge Your Incident Response Tabletop Exercises

Stephen Nelson


A Threat Model for Us All

Joshua Williams

Shawn of the Dead

Rescue the Penguin – Malware & Forensics on Linux

John Robertson

28 Days Later

I’m From the Government and I’m Here to Help: Cyber Regulations Present and Future

Matthew Watson

Walking Dead


Our friends at Optiv are throwing an after-party following the conference. Join us for fun, drinks, and food (no more brains. )

5PM at Chicken N’ Pickle

8400 N Oklahoma Ave, Oklahoma City, OK 73114


Diamond Sponsors

Blue Lava

Platinum Sponsors

American Fidelity
Go Security Pro

Gold Sponsors

Critical Fault
Set Solutions
Secure Ideas
Oklahoma Christian

After Party | Coin Sponsor


Silver Sponsors

Safe Breach
Orca Security

Bronze Sponsors

Irius Risk

Last Year Gallery

The apocalypse was starting to pass and we came back with a bang!