BSidesOklahoma 2018 April 13, 2018 to April 13, 2018, Oklahoma, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: I Upped My Security Game. Now Up Yours Tim Medin N/A
How you CAN detect PowerShell exploitation and malicous use. Michael Gough This talk will show a few examples of PowerShell exploitation that can be caught, what ...
How I Bought a House with Bitcoin Bobby Simpson Learn how Bitcoin and blockchain came about and how it works in the real world. ...
OOM OOM Pow! Deserialization Jason Gillam Do you still find object deserialization flaws to be some kind of inexplicable magic that ...
How to Build a Security Awareness Escape Room Erin Vance How do you reach a wide audience and make security awareness fun? On a tight ...
Cryptology: It's a Scalpel, not a Hammer Mikhail Sudakov We live in a world today where most security analyst only respond to the blinking ...
How to run your code on the dark web (and why you should) Luke Crouch Tor is an anonymous network and browser. Millions use Tor every day. Is your code ...
Securing Azure, Azure Secured Stephen Nelson Ten things you should be doing to secure your Microsoft Cloud. I love all the ...
The Forgotten Fruit: Repairing the Misconception Honeypots Only Produce Statistics and Stale Data Instead of Actionable Intelligence Ramece Cave Honeypots have a mixed reputation in the industry, feelings aside, they are needed. Have you ...
Panel: Infosec Professionals Ask Me Anything N/a N/A
The Stick, the Sting, & the Squirm: How to Get The Board to Focus on Cyber Seth Jaffe Boards of Directors are finally taking note of cybersecurity risks. This session will arm attendees ...
Web Pentesting With Modern Authentication Protocols Michael Oglesby SAML, OAuth, JWT, OpenID. If these acronyms excite you then this is the talk for ...
What Could It Hurt: How Framework and Library Dependence is Weakening our Development Kevin Johnson In this presentation, Kevin Johnsonwill discuss how security works, why we do the things we ...
You Don't Need a Pen Test: Ten things you should be doing first. Nathan Sweaney You Don't Need a Pen Test: Ten things you should be doing first. Stuff?
FBI: Cybercrime Case Briefings Rich Lay I will discuss a money mule undercover operation, and the investigation and prosecution of a ...
A Token Walks Into a SPA... Ado Kukic Between Angular, React, & Vue it can be hard NOT to build SPAs these days. ...
Attacker vs. Defender: Observations on the Human Side of Security Todd O'boyle Security operators always take the same approach when responding to an attack - find the ...
An inside look at Cyber Crime Ramiro Pozzani "Hey, I just ""hacked"" a lot of servers that were used by criminals, want to ...
Micro-segmentation: Practice makes perfect Mike Mattice Lateral movement is what your adversaries want. Limit what can talk to each other and ...