Information Warfare Summit
Redefining Normal
Welcome back to our 14th year! We’re back and ready to bring things back to normal. Join us for our star-studded speaker line-up, food, swag, and rebuilding your connections!
October 6th, 2021
Oklahoma Christian University

Book Your Ticket Now
Meet Our Keynote
Scott Augenbaum
Cybercrime Keynote Speaker | Retired FBI Supervisory Special Agent of Cyber Division | Author
After joining the Federal Bureau of Investigation (FBI) in the New York Field Office in 1988 as a support employee, Scott Augenbaum became a Special Agent in 1994 and was assigned to the Syracuse, New York Office, where he worked domestic terrorism, white collar and hate crimes, and all computer crime investigations. In October 2003, Agent Augenbaum was promoted to Supervisory Special Agent at FBI Headquarters, Washington D.C in the Cyber Division, Cyber Crime Fraud Unit and was responsible for managing the FBI’s Cyber Task Force Program and Intellectual Property Rights Program. In 2006, Mr. Augenbaum transferred to Nashville, TN and managed the FBI Memphis Division Computer Intrusion/Counterintelligence Squad in Nashville, TN.
Over the past ten years, Retired Special Agent Scott Augenbaum has had the opportunity to provide hundreds of computer intrusion threat briefings with the goal of educating the community on emerging computer intrusion threats and how to not to be the victim of a data breach.
Scott earned an MBA at American Sentinel University in Information Technology and a Masters Certificate in Information Security Management from Villanova University in addition to holding numerous General Information Assurance Certifications.
Social
Continued Learning
We are hosting two half-day learning sessions with exceptional members of the community. Expand your networking and job options with our Career room. Get real world experience with the Tools of the Trade for cybersecurity.
Career Room
Hosted by Melanie Hendricks.
Discover New Opportunities in the Career Room. Melanie works with individuals to fine tune their resumes, improve their interviewing skills, & advance their career paths.
Melanie has over 10 years’ experience in Technology Staffing and over 20 years in Technology-related Corporate Sales.
Melanie is very active in the Security community & you might recognize her for her repeat participation as a speaker, supporter, or sponsor of the ISSA, ISACA, IIA, BSides, IWS (Information Warfare Summit), & The Information Symposium.
Melanie currently works with clients locally & all over the USA to place candidates in a variety of technology-centric positions.
Some examples include: CIOs/CTOs/IT Directors, Security, Networking, Infrastructure, Applications & Development, DevOps, Project Managers, etc.
Tools of the Trade
Hosted by Jonathan Kimmitt.
In the world of cyber security, many forget that one of the greatest vulnerabilities to an organization is through poor physical security. Understanding the risks to physical devices and locations is extremely important in protecting our people, data, and systems. In this session we will be exploring a variety of hardware tools that are used by attackers to capture data, gain access, and otherwise bypass security controls.
We will be covering tools such as key loggers, prox cloners, physical key manufacturing, physical door/lock bypass tools, and many more. There will be several hands on labs learning how to use, improvise and defend against these tools.
If you have ever wanted to learn how to pick locks with paper clips, use a milk jug to open a locked door, or if you want to see how to protect yourself from key loggers, card cloners, and malicious wireless tools, stop by and lets talk about the physical side of cyber security!
Find Your Favorite Talks
We’ve got an amazing line up of talks and speakers ready to keep your skills sharp and mind informed.
CONFERENCE SCHEDULE
Opening Remarks
John deSteiguer - President of Oklahoma Christian University
Chad Kliewer - President of Infragard Oklahoma
Baugh Auditorium
Are You Prepared Or Are You The Next Victim?
Scott Augenbaum
Baugh Auditorium
Self-Programming Security Controls - Are We There Yet?
As cloud based analytics has transformed the security landscape, automation of security controls looms close on the horizon. Will self-programming security controls be the new normal? What will human security professionals do in the new world order?
Christopher Yates
Baugh Auditorium
Scaling our Impact
Cyber defense is more challenging today than ever. Attackers are well funded, IT systems have been overhauled, and everyone with a pocket book is now a target. In this talk, Geoff Wilson, CEO and Founder of Go Security Pro, will discuss practical strategies for scaling our impact in Cybersecurity.
Geoff Wilson - Go Security Pro
Baugh Auditorium
XDR- Oh Great....Another Acronym?
EDR, MDR, NDR, what's the next "DR"? It's XDR. Let's demystify the hype behind XDR, what it is and what it isn't, and what it will mean to your organization and this industry.
Rick Kennedy - Optiv
Baugh Auditorium
Arrest the CISO! U.S. v. Sullivan and what it means for criminal liability for data breaches
Last year prosecutors brought charges against Joe Sullivan, CSO of Uber, for covering up a data breach. While the case is in the initial stages, it raises questions about whether similar charges will be brought against executives that fail to report breaches.
Anthony Hendricks - Crowe & Dunlevy
Baugh Auditorium
From the Tiniest Flaw to a Full Ransomware Event: A Hacker's Perspective
The tiniest Flaw in an information system can result in a devastating breach. As a professional penetration tester, I'll cover use cases and methodologies from real world hacks. We'll dive into all the technical details and discuss strategies to mitigate the threats.
2021 has been full of ransomware and supply chain attacks in the news, but we've never gotten a full breakdown of how hackers got their foothold. Join us as we discuss real world attacks, the hacker mindset, and the strategies your organization can use to shut down an attempted breach.
Kris Wall - Critical Fault
Baugh Auditorium
The Cyber Arms Race: An analysis of Conti Ransomware tool leak
Insider threats happen to bad guys too. Recently a Conti ransomware affiliate was burned and released all the tools and documentation provided to him. We'll take a look at the TTP's outlined in the tool release and compare them against real world ransomware engagements we've worked.
Andrew Lemon - Alias Infosec
Baugh Auditorium
Is Security Awareness enough to protect your organization?
Organizations have a security awareness and training programs. but how many of the employees take it, retain it, or use it? If the program is useful, why do breaches continue to occur? Thus the next evolution of security awareness needs to be an influential security culture. No more ID-10-T errors!
James McQuiggan - KnowBe4
Baugh Auditorium
Home is Where the Hack Is
The pandemic has fast-tracked remote work. Employees are enjoying the convenience of working from home with full connectivity back to the office. Cheap coffee, PJs and poor network hygiene. What could go wrong? Join me to learn about how our homes, now more than ever, are the attack vector for gaining access to corporate data as well as earning easy money.
Jaime Ortiz - Fortinet
Baugh Auditorium
Cyberbullying: Be Prepared!
Last year, due to the Pandemic and health restrictions, millions of young students were forced to go online to attend school. In addition, this resulted in children being exposed to more in this day and age due to social media. With the growth in children having access to smartphones, and the social networking world constantly evolving, online bullying has skyrocketed and has become alarmingly dangerous especially in pre-teens to young adults.
This talk will explore the world of cyberbullying, what it is and why it needs addressing just as we are addressing other serious cyber-criminal activity. We will learn how to detect cyberbullying, how to intervene, and what steps you can take as a parent, guardian, or educator to prevent cyberbullying.
Curtis Coleman - Oklahoma Christian
Baugh Auditorium
4:00
Hall Con
Go mingle!
Expo Area
4:30
Closing Ceremonies & Door Prizes
IWS Crew
Baugh Auditorium
5:00
Afterparty!
Come grab a drink with us!
Sponsored by Optiv and Palo Alto. Give them thanks for the drinks!
Main Event - 1441 W Memorial Rd, Oklahoma City, OK 73114
TRACK 2
Army Cyber Security Panel hosted by Kevin Turner
Kevin Turner will host the joint Oklahoma Military/State Team panel with commander National Guard Cyber Command Captain Dan Slusarchuk, this year sharing behind the scenes discussion from team members that participated in Cyber Shield 2021.
Kevin Turner - Solara Surgical Partners
Judd Theater
Inside a Ransomware Incident
This presentation is an extension of the SANS Rekt Casino series which is based on numerous real world ransomware attacks.
In this presentation I will talk about what it's like from the incident responder perspective, the IT team perspective, and from the business perspective.
I will cover how to respond to the incident, negotiating with the attackers, recovering from the attack, and reporting to the business as an independent consultant, or as a member of the IT or security team.
Things never go as planned and this provides good insight as to what actually happens behind the scenes and how things can go very wrong with the appropriate preparation.
Joe Sullivan - ANTICRYSYS
Judd Theater
DevSecOops!: Application Development Security and YOU!
"Dependencies, pipelines, and vulnerabilities -- Oh, my!
Security teams and developers are often at odds with one another. With the fast and furious adoption of agile development cycles, how can we, as security professionals stay on top? Bridging the gap is now more important than ever!"
Stacy Dunn - Snyk
Judd Theater
Biohacker: The Invisible Threat
Security professionals won't allow users into their environment with hacking tools, so how do you address people with implants? People are the attack vector and the tool. The ability to compromise contactless tech threatens physical & digital security. How do you stop a Cyber threat from a human?
Len Noe - CyberArk Software
Judd Theater
Third-Party Risk Management & Supply Chain Security
COVID demonstrated to the world that supply chains are critical to our society and are vulnerable to many different types of disruptions. Not just cyber security disruptions.
Gordon Rudd - Stone Creek Coaching
Judd Theater
4:00
Hall Con
Go mingle!
Expo Area
4:30
Closing Ceremonies & Door Prizes
IWS Crew
Baugh Auditorium
5:00
Afterparty!
Come grab a drink with us!
Sponsored by Optiv and Palo Alto. Give them thanks for the drinks!
Main Event - 1441 W Memorial Rd, Oklahoma City, OK 73114
TRACK 3
12:00

Making Cybersecurity Training Fun Through Small Scale CTF Events
Cybersecurity training is usually low on everyone's priority list, often falling to the individual practitioners to deal with on their own time. By neglecting training we are letting our cybersecurity knowledge atrophy, increasing the time it takes to identify bad actors and resolve threats. By using open source tools and frameworks, running small scale CTF's becomes a fun and easy way to train your staff on how to recognize and deal with threats.
In this session - Learn what free training tools you have at your disposal, how to run your first small scale CTF, and level up your Security Analysts the fun way!
Joseph Poyner is a Strategic Sales engineer for SentinelOne and is dedicated to making the world more secure by helping his customers deploy world class cybersecurity solutions. Over his 10+ years in the Cybersecurity field, Joseph has worked for 4 different EDR vendors and he uses that depth of knowledge when consulting with customers. Joseph also maintains his CISSP and volunteers with local groups that focus on teaching youth STEM and Cybersecurity topics.
Joseph Poyner - Sentinel One
Adams Recital Hall
12:30

Safeguarding Privacy: Evolving FTC Regulations for Safeguarding Consumer Financial Information
Have you reviewed your organization's governmental information security compliance requirements? This talk is a cheat sheet for evolving FTC InfoSec safeguards required of organizations electing to store consumer financial information.
An executive at a large financial institution, hit with thousands of regulatory audit findings, recently said to me, “Where is it written that I have to implement certain information security safeguards? People have been saying that to me for years, so I went to find out. Join me for an opinionated review of the federal statutory foundations and evolving FTC regulatory requirements on “other persons†to implement and maintain information security safeguards. Plus, how could anyone miss a compliance-risk-feature-chart-road-map-cheat-sheet based upon a headless job analysis? Anyone? Beuler? Beuler? Ok, so I will try and make it as fun as I can.An executive at a large financial institution, hit with thousands of regulatory audit findings, recently said to me, “Where is it written that I have to implement certain information security safeguards? People have been saying that to me for years, so I went to find out. Join me for an opinionated review of the federal statutory foundations and evolving FTC regulatory requirements on “other persons†to implement and maintain information security safeguards. Plus, how could anyone miss a compliance-risk-feature-chart-road-map-cheat-sheet based upon a headless job analysis? Anyone? Beuler? Beuler? Ok, so I will try and make it as fun as I can.
Steve Russell - Nodeout Perspective
Adams Recital Hall
Google is making us more vulnerable
Many new and experienced developers turn to Google for code examples when building software. Some will even copy and paste these examples into their project and publish without thinking twice. How is this affecting our systems' security?
Jeff Maxwell - Oklahoma City University
Adams Recital Hall
It's INFORMATION warfare after all...
Every Info Sec career has a report writing moment (likely several). Be it an email brief to management or a risk assessment, incident response, metrics or executive report. Your CEO, Board, VP, CISO, CIO, Director, etc. will thank you for learning these tips for successful Info Sec writing.
Daisha Pennie - Oklahoma State University
Adams Recital Hall
Protecting the penguin! Linux security as armor!
This is mission critical defense for your Linux systems! Red team rascals on the the outside, check! How do you make the the inside sider threat a non starter? And the worst gut check of all - the auditors! Come to this talk and learn documents to learn from and practices to don Lets suit up!
John Robertson
Adams Recital Hall
Level Up Your SIEM Game with OSSEM: The Open Source Security Events Metadata (OSSEM)
Learn about the OSSEM project and how it is being implemented in Azure Sentinel to normalize events from all types of sources, making searching your logs easier than ever. You will learn some Kusto Query Language (KQL) during the talk, but you don't need to know it beforehand.
John Spaid
Adams Recital Hall
4:00
Hall Con
Go mingle!
Expo Area
4:30
Closing Ceremonies & Door Prizes
IWS Crew
Baugh Auditorium
5:00
Afterparty!
Come grab a drink with us!
Sponsored by Optiv and Palo Alto. Give them thanks for the drinks!
Main Event - 1441 W Memorial Rd, Oklahoma City, OK 73114
Meet Our Sponsors
The Information Warfare Summit couldn’t happen without the support of our sponsors.
Critical Start
Diamond
Optiv
After Party!
American Fidelity
Platinum
Go Security Pro
Platinum
Oklahoma Christian University
Gold
Alias Infosec
Gold
KnowBe4
Gold
CyberSixGill
Keynote & Pre-Party
Fortinet
Gold
Critical Fault
Silver
Recorded Future
Silver
Set Solutions
Silver
Rapid7
Silver
SentinelOne
Silver
Guidepoint Security
Silver
Secure Ideas
Silver
Artic Wolf
Silver
Varonis
Bronze