IWS 16
October 2, 2024
Edmond Conference Center
2833 Conference Dr.
Edmond, OK 73034
Keynote Speakers
-
Perry Carpenter, KnowBe4
New Trends in Deception
They say, everything old is new again. That may be true, but it doesn’t diminish the fact that technology allows age-old principles and tactics to operate in ways and at scales previously unimaginable. So, what does that mean for deception?
This session will explore the topic of deception from multiple angles. We’ll start by looking at the psychological principles of deception and consider the application of deceptive techniques throughout history. With that foundation set, we’ll look at a number of new and scary ways cybercriminals, governments, and every day folk can easily mount highly effective deception-based attacks. -
Tyler Moore, University of Tulsa
Empirically Evaluating the Effect of Security Precautions on Cyber Incidents
Available data on firm cybersecurity often exhibits a positive correlation between investment in security precautions and cyber attacks since investments are often made after a firm has been breached. In this talk, I will present econometric evidence that greater firm investment in cybersecurity does in fact yield results. Drawing from a comprehensive survey of Israeli firms, we find that organizations adopting a suite of six basic cybersecurity controls are less likely to subsequently experience incidents. We successfully establish this relationship by carefully an instrumental variable to compensate for unknowns in the timing of security investments that often plague empirical work in cybersecurity. These findings have significant public policy implications, especially as governments demand greater returns to cybersecurity investments that can be objectively evaluated. I will conclude the talk by discussing several strategies for gathering additional data to increase the evidence base for making sound cybersecurity decisions moving forward.
Tech Villages
Community & Career room
Come see our community outreach room (ISACA, ISC2, OKWIT, OK-ISAC, AFCEA, FBI, OCAST, Techlahoma, OneNet, etc.). You can also touch base with Melanie Hendricks from Information Technology Staffing, LLC for resume review and job search assistance. Morning and afternoon snack breaks will be served in the community & career room.
Oklahoma’s Defensive Cyberspace Operations Element Cyber Village
BRING YOUR LAPTOP IF YOU WANT TO PLAY!! Test your skills or learn. Three lanes to choose from or try all three.
Event Log Forensics – Most events get logged by something, take a deep dive into event logs, and try to uncover the mysteries of the past.
Memory Analysis – You may have heard of fileless malware, well it lives in RAM. See what you can see in memory.
Network Hunting – The network is full of traffic. Take a look at some traffic and figure out what is going on.
Physical (In)Security
Have you ever wondered what it would be like to pick your first lock? How about using an under door tool to completely bypass lockpicking or even cloning an RFID badge? Come by to check out all of the surprisingly easy ways physical security can be bypassed. We will also be having a contest for fastest lock pickers and best solution for filling a security gap.