Schedule of Events



Opening Remarks

Chad Kliewer

πŸ•– 15 minutes


Keynote: Focused

We live in a world of distractions. Through this program, Dr. Mellor explores how breakthroughs in the world of neuroscience are providing meaningful insights into how to train the brain for focus. The program is a breakthrough event that is extremely engaging and practical. Applicable to all, the content can be applied instantly and is a crowd favorite. (Leadership, Motivation/Inspiration)

Dr. Nathan Mellor - Strata Leadership

πŸ•– 60 minutes


From Fad to Foe: Defending Against Weaponized AI

Initially dismissed as a buzzword by many security practitioners, our adversaries have now been utilizing AI for years. Today, the product of even crude AI can be indistinguishable to human perception and unlike other techniques used to deceive or destroy, AI doesn’t have to wait on a human being to improve its efficacy. AI makes itself more elegant and more efficient with every additional data point it interacts with. Our adversaries understand that AI is an indispensable addition to their arsenal. From malware that learns how to deceive its target to misinformation campaigns designed to deplete a target of resources, AI allows a maximum return on investment by decimating the amount of time and effort spent on a desired result.

Drawn on Lucas’s own experience defending systems against attacks - both human and machine powered - this talk will explore how artificial intelligence is being weaponized against the organizations we defend and how security practitioners can harness AI in unique ways to protect against such attacks.

Lucas Chumley

With a decade’s experience in digital forensics and incident response, Lucas has assisted both large and small organizations in various industries with implementing security solutions and incident response procedures. At SentinelOne, Lucas supports a broad range of clients across the southeast United States focusing on detection and automation.

Lucas Chumley - Sentinel One

πŸ•– 60 minutes


The Cuckoo Effect

Attackers are here! They are ready to attack your applications, web sites, IoT devices, smart devices, and anything connected to the Internet. Learn how cybercriminals create malware, ransomware, and phishing campaigns. We will look at conventional evasion techniques used by attackers to bypass security products. In this talk, FortiGuard Labs researcher will discuss how researchers find, track, and protect against attacks from the most dangerous cyber attackers.Β 


Aamir Lakhani

Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations.


Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies.

Aamir Lakhani - Fortinet

πŸ•– 60 minutes


TLS 1.3 Deep DiveΒ 

Geoff Wilson - Go Security Pro

πŸ•– 30 minutes

Build Minotaurs, not Machines: Lessons Learned from Integrating AI into Cybersecurity Operations

Matt Beringer - Rapid 7

πŸ•– 30 minutes

Microsoft Teams Explosion: How to Prevent Data Leaks

Greg Bailey - Varonis

πŸ•– 30 minutes

CISSP Prep Panel

Jonathan Kimmitt, John Spaid, Nathan Sweaney, Rob Hines

πŸ•– 60 minutes

Sentinel One

πŸ•– 30 minutes


Let the Machines Do Your Hunting For You - Why Big Data and Analytics Have Changed the Security Landscape

Chris Yates - Critical Start

πŸ•– 30 minutes

Integrated Outcomes

Todd Weber - Optiv

πŸ•– 30 minutes

Async Intelligence Gathering with Python

Jeff Bowie - Alias Forensics

πŸ•– 30 minutes

Stinnett & Associates

πŸ•– 30 minutes


Advanced Hybrid Identity with Azure AD

John Spaid - Microsoft

πŸ•– 60 minutes

Army Cyber Security Panel

Kevin Turner - Solara Surgical Partners, Captain Dan Slusarchuk

πŸ•– 60 minutes

Trust, but Verify: Maintaining Democracy In Spite of Π˜Π½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹Π΅ ΠΊΠΎΠ½Ρ‚Ρ€ΠΌΠ΅Ρ€Ρ‹

Allie Mellen - Cybereason

πŸ•– 60 minutes

Getting into InfoSec - Panel

Dr. Jon McHenry, Professor Haifeng Ji, Curtis Griffin, Pedro Serrano

πŸ•– 60 minutes


πŸ•– 30 minutes



πŸ•– 30 minutes


How to Hire More Women in 3 Easy Steps!

Stacy Dunn

πŸ•– 60 minutes

CMMC: A Compliance Journey

Vincent Scott - Cybersecurity Group

πŸ•– 60 minutes

Security Leadership and Management Competencies

Joe Sullivan - Rural Sourcing

πŸ•– 60 minutes

Linux Hardening in 2020

John Robertson

πŸ•– 60 minutes

Go Security Pro

πŸ•– 15 minutes



πŸ•– 15 minutes


Rapid 7

πŸ•– 15 minutes


Critical Start

πŸ•– 15 minutes


The Gap Between Compliance and Security

Kristopher Wall - Stinnett & Associates

πŸ•– 60 minutes

Risky Business: Updating Our IT Application Risk Assessment Process

Rich Lay - Devon Energy

πŸ•– 60 minutes

Using a 30-60-90 Day Plan to Become A Rockstar CISO

Gordon Rudd - Venminder

πŸ•– 60 minutes

College of Lockpicking

Derek Hubbard

πŸ•– 60 minutes

Rack 59

πŸ•– 15 minutes



πŸ•– 15 minutes


Closing Ceremonies & Door Prizes

IWS Crew



We’ve chosen two outdoor locations: Top Golf in Oklahoma City and Flying Tee in Tulsa. Masks will be provided to help attendees keep safe. The after party starts after the conference.

What: Happy Hour following IWS conference – Hosted by Optiv and Friends!

When: October 7, 2020 5:00-7:00pm

Where: 2 separate locations this year to accommodate both Tulsa and OKC areas! Top Golf OKC and Golf Suites Tulsa (Jenks). Please register if you plan to attend, at the location nearest to you so we have an accurate count:

Enjoy food, beverages, networking with peers and golf, in a socially distanced atmosphere.